US20120054822A1 - Methods and apparatus to implement electronic book viewers - Google Patents
Methods and apparatus to implement electronic book viewers Download PDFInfo
- Publication number
- US20120054822A1 US20120054822A1 US12/873,994 US87399410A US2012054822A1 US 20120054822 A1 US20120054822 A1 US 20120054822A1 US 87399410 A US87399410 A US 87399410A US 2012054822 A1 US2012054822 A1 US 2012054822A1
- Authority
- US
- United States
- Prior art keywords
- content
- display panel
- electronic book
- protection policy
- book viewer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 230000004224 protection Effects 0.000 claims abstract description 184
- 238000004891 communication Methods 0.000 claims description 72
- 230000008569 process Effects 0.000 claims description 22
- 230000008859 change Effects 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 7
- VEMKTZHHVJILDY-UHFFFAOYSA-N resmethrin Chemical compound CC1(C)C(C=C(C)C)C1C(=O)OCC1=COC(CC=2C=CC=CC=2)=C1 VEMKTZHHVJILDY-UHFFFAOYSA-N 0.000 description 32
- 238000012546 transfer Methods 0.000 description 26
- 238000005516 engineering process Methods 0.000 description 12
- 238000003860 storage Methods 0.000 description 10
- 238000010295 mobile communication Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 230000033001 locomotion Effects 0.000 description 8
- 230000002085 persistent effect Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 230000000153 supplemental effect Effects 0.000 description 5
- 238000004519 manufacturing process Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 235000014676 Phragmites communis Nutrition 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 239000000446 fuel Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1637—Details related to the display arrangement, including those related to the mounting of the display in the housing
- G06F1/1647—Details related to the display arrangement, including those related to the mounting of the display in the housing including at least an additional display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1637—Details related to the display arrangement, including those related to the mounting of the display in the housing
- G06F1/1654—Details related to the display arrangement, including those related to the mounting of the display in the housing the display being detachable, e.g. for remote use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/02—Digital computers in general; Data processing equipment in general manually operated with input through keyboard and computation using a built-in program, e.g. pocket calculators
- G06F15/025—Digital computers in general; Data processing equipment in general manually operated with input through keyboard and computation using a built-in program, e.g. pocket calculators adapted to a specific application
- G06F15/0291—Digital computers in general; Data processing equipment in general manually operated with input through keyboard and computation using a built-in program, e.g. pocket calculators adapted to a specific application for reading, e.g. e-books
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Definitions
- the present disclosure relates generally to mobile media devices and, more particularly, to methods and apparatus to implement electronic book viewers.
- Electronic books are typically digital publications that may be stored in and displayed via different types of electronic devices including stationary and portable devices. Some known e-book readers are software applications installed in processor systems such as computers or portable devices, while other e-book readers are dedicated devices that provide functionality specifically tailored for reading published works in electronic format. Some known portable electronic devices for displaying e-books are e-book readers, personal digital assistants, and smart phones. Acquiring e-books may involve purchasing and downloading from an online store or purchasing e-books stored on a removable storage medium.
- FIG. 1 depicts an example electronic book viewer shown with a mobile communication device and local and remote content data stores.
- FIG. 2 depicts an example removably attachable display panel configured to operate in multiple modes and interchangeable for sharing between the example electronic book viewer of FIG. 1 and another example electronic book viewer.
- FIG. 3 depicts an example binding element and an example removably attachable display panel of the electronic book viewer of FIGS. 1 and 2 .
- FIG. 4 depicts a plan view of the example binding element and removably attachable display panel of FIG. 3 in an interconnected configuration.
- FIG. 5 depicts a plan view of the example electronic book viewer of FIGS. 1 and 2 .
- FIG. 6 depicts the example electronic book viewer of FIGS. 1 , 2 , and 5 in an example paneling configuration.
- FIG. 7 depicts an example configuration for creating, storing, and accessing content protection policies associated with content presentable on the example electronic book viewer of FIGS. 1 , 2 , and 5 .
- FIG. 8 depicts example manners of communicating content between electronic book viewers, between host devices, and between host devices and electronic book viewers.
- FIG. 9 depicts an example manner of transferring shareable content between electronic book viewers without sharing non-shareable content.
- FIG. 10 depicts an example apparatus that may be used to implement the electronic book viewer of FIGS. 1 , 2 , 3 , 5 , 7 , and 8 .
- FIG. 11 depicts an example block diagram of the mobile device of FIGS. 1 , 7 , and 8 .
- FIG. 12 depicts an example flow diagram representative of computer readable instructions that may be used to display content on the electronic book viewer in accordance with content protection policies.
- FIG. 13 depicts an example flow diagram representative of computer readable instructions that may be used to transfer content between electronic book readers and/or host devices in accordance with content protection policies.
- an electronic book viewer implemented in accordance with the example methods and apparatus disclosed herein may be a multi-page electronic book viewer including two or more display panels, which may be single-sided or dual-sided display panels.
- the multi-page electronic book viewer may be adapted to include removably attachable display panels to facilitate after-market re-configurations thereof by adding additional display panels thereto and/or removing display panels therefrom.
- some example display panels may be configured to be physically interchanged or shared between two or more multi-page electronic book viewers. Such physically interchangeable display panels may be used to facilitate sharing content between different electronic book viewers.
- the example electronic book viewers disclosed herein may be configured to display unprotected content (e.g., open content) and protected content.
- Protected content may include content protected from undesired or impermissible distribution or accessibility. Some content may be protected from being displayed on some electronic book viewers (or to particular users or types of users), while not being protected from displaying on other electronic book viewers (or to particular users or types of users).
- the example methods and apparatus disclosed herein may be used to create, store, access, and/or enforce content protection policies.
- Such content protection policies may be pre-defined or commercially available protection policies or end-user-created protection policies.
- Pre-defined protection policies may be created by, for example, content publishers prior to publishing electronically presentable content (e.g., electronic books, web content, and/or other media).
- End-user-created protection policies may be created by, for example, end users of electronic book viewers or other individual persons that generate documents or supplemental information to pre-existing documents and desire to protect their documents or supplemental information from access by persons other than those for which permissions are specifically granted.
- the example methods and apparatus disclosed herein may be used to enforce content protection policies using one or more content protection enforcement techniques.
- some content protection techniques may involve conditional transmission/reception of content between two or more electronic book viewers depending on protection policies of content and permissions associated with target recipients.
- Other example content protection techniques may be based on capabilities of display panels to be removably attachable to separate electronic book viewers by conditionally presenting content based on an attachment status of a display panel to an electronic book viewer.
- Such content protection techniques and others disclosed herein may be used in connection with an electronic document or published work in its entirety or in piecemeal fashion on portions (e.g., individual pages) of such documents or published works.
- pre-existing authored works may include electronically published books, official documents (e.g., medical records, legal documents, etc.), etc.
- user-authored works may be user-created documents or messages, user notes, comments, and/or markups created by an end user regarding the content of the pre-existing authored works.
- Content protection policies for a pre-existing authored work may be relatively more open than user-created content protection policies for user-authored notes or supplemental information regarding the content of such pre-existing authored work.
- the example methods and apparatus disclosed herein may be used to allow sharing the original pre-existing authored work with others while hiding or protecting the corresponding user-authored works from viewing by non-authorized or non-permitted persons.
- the example methods and apparatus described herein may be used in connection with mobile communication devices, mobile computing devices, or any other device capable of communicating wirelessly with a wireless network.
- Such devices also referred to as terminals, wireless terminals, or user equipment (UE)
- UE may include mobile smart phones (e.g., a BlackBerry® smart phone), wireless personal digital assistants (PDA), laptop/notebook/netbook computers with wireless adapters, etc.
- mobile smart phones e.g., a BlackBerry® smart phone
- PDA personal digital assistants
- laptop/notebook/netbook computers with wireless adapters etc.
- FIG. 1 depicts an example electronic book viewer 102 shown with a mobile device 104 (e.g., a mobile communication device) and local and remote content data stores.
- the electronic book viewer 102 includes removably attachable display panels 106 a - c configured to turn like pages of a book.
- each of the removably attachable display panels 106 a - c may be removed from the electronic book viewer 102 and operate as a stand-alone display in an unattached mode (e.g., a tablet mode).
- each of the removably attachable display panels 106 a - c may be attached to other electronic book viewers (e.g., an electronic book viewer 202 of FIG. 2 ) to, for example, share content between different users.
- the electronic book viewer 102 is shown in communication with the mobile device 104 via a wireless communication connection 108 (e.g., a Bluetooth® connection, a WiFi connection, etc.) and is configured to exchange content and content protection policies with the mobile device 104 .
- the mobile device 104 is a content and content protection policy host for the electronic book viewer 102 .
- the mobile device 104 may include a local content data store 110 and a local content protection policy data store 112 .
- the electronic book viewer 102 is configured to present media (e.g., text, graphics, video, audio, etc.) stored in and/or retrieved from the local content data store 110 of the mobile device 104 .
- the electronic book viewer 102 may also be configured to operate as an external display for the mobile device 104 to present content ordinarily presented on a display of the mobile device 104 (e.g., mobile device applications, emails, address book entries, etc.).
- the electronic book viewer 102 may operate in connection with other types of hosts other than the mobile device 104 .
- Such other hosts may be any other type of processor systems including computers, personal digital assistants (PDAs), servers, etc.
- the local content data store 110 may store pre-existing and/or published authored works (e.g., e-books, official documents, webpage content, etc.) or user-authored works (e.g., user-created documents, user-created media, emails, calendar appointments, supplemental notes, markups, comments, etc.).
- the local content protection policy data store 112 may store content protection policies for the content stored in the local content data store 110 .
- content protection policies and corresponding content may be stored together in the same data store. For example, a file or database storing content may also store the protection policies corresponding to that content.
- the mobile device 104 may be implemented using a mobile/cellular phone, a smart phone, or any other personal communication device and may be configured to communicate with network entities such as remote content servers 114 and 116 via a network 118 (e.g., the Internet, an intranet, a local area network (LAN), etc.) to retrieve content and/or content protection policies.
- network 118 e.g., the Internet, an intranet, a local area network (LAN), etc.
- the mobile device 104 may operate as a host device to serve content and content protection policies to the electronic book viewer 102 .
- the mobile device 104 may operate as an authorizing device that analyzes content protection policies and authorizes the electronic book viewer 102 to present content in accordance with such protection policies.
- the electronic book viewer 102 and the mobile device 104 may share enforcement responsibilities of content protection policies.
- the content server 114 is a service provider content server (e.g., a content server owned and/or operated by a communication service provider servicing and maintaining a subscription for the mobile device 104 ) and includes a remote content data store 120 and a remote content protection policy data store 122 .
- the content server 116 is a third-party content server (e.g., a content server that stores and serves electronic books or other media electronically published and distributed by a media content provider) and includes a remote content data store 124 and a remote content protection policy data store 126 .
- the mobile device 104 may operate as a proxy or intermediate communication device between the electronic book viewer 102 and the remote content data stores 120 and 124 .
- the mobile device 104 may retrieve content from the remote content data stores 120 and 124 and store the retrieved content in its local content data store 110 for presentation via the electronic book viewer 102 .
- network-stored content is not stored locally in the local content data store 110 but is instead streamed to the electronic book viewer 102 .
- Content retrieval may or may not be based on a content subscription.
- the local content data store 110 and the remote content data stores 120 and 124 may store protected content and unprotected content (e.g., open content).
- the electronic book viewer 102 is configured to receive and enforce corresponding content protection policies from the local content protection policy data store 112 and/or the remote content protection policy data stores 122 and 126 .
- the mobile device 104 may process the content protection policies and instruct the electronic book viewer 102 regarding the manner in which to enforce such protection policies.
- content protection policies stored in the content protection policy data stores 112 , 122 , and 126 may be implemented in accordance with digital rights management (DRM) standards, guidelines, or formats to protect or control access to, for example, authored works that are electronically published and commercially available to any consumer.
- DRM digital rights management
- Content protection policies may also be implemented in accordance with enterprise digital rights management (E-DRM or ERM) standards to protect or control access to corporate documents or other non-public documents (e.g., user-authored works, personal works, medical records, legal documents, etc.).
- E-DRM or ERM enterprise digital rights management
- content protection policies may be user-created and enforced in accordance with user-specified rules.
- Each pre-defined or user-created content protection policy may include different rules, provisions, or restrictions associated with different modes or operating scenarios of the electronic book viewer 102 or removably attachable display panels 106 a - c of the electronic book viewer 102 .
- Such modes or scenarios may include attachment statuses of the removably attachable display panels 106 a - c to the binding element 206 , proximity of the electronic book viewer 102 to the mobile device 104 , a connection between the electronic book viewer 102 and a service provider information technology (IT) policy server 128 , a connection between the mobile device 104 and the service provider IT policy server 128 , permissions in the service provider IT policy server 128 for the electronic book viewer 102 and/or the mobile device 104 , content expiration times, etc.
- IT information technology
- Content protection policies may be implemented based on different types of protection conditions including conditions associated with a unique identifier of the electronic book viewer 102 and/or the mobile device 104 , proximity of the electronic book viewer 102 to the mobile device 104 , connection status of the mobile device 104 or the electronic book viewer 102 with a service provider network, date/time, duration, attachment statuses of the removably attachable display panels 106 a - c relative to the electronic book viewer 102 , and/or any other types of conditions.
- the electronic book viewer 102 may present content so long as a unique identifier of the electronic book viewer 102 and/or the mobile device 104 matches a unique identifier stored in association with a corresponding protection policy of the content.
- the electronic book viewer 102 may present protected content so long as it is within wireless communication range of the mobile device 104 and/or connected to a service provider network via the mobile device 104 . That is, when the electronic book viewer 102 is no longer within communication range of the mobile device 104 , the electronic book viewer 102 may be configured to cease presentation of the protected content.
- the electronic book viewer 102 may be configured to present protected content until an expiration date/time has been reached and/or so long as an assigned duration has not expired.
- the electronic book viewer 102 may be configured to present protected content until an expiration date/time has been reached and/or so long as an assigned duration has not expired.
- the electronic book viewer 102 may be configured to present protected content until an expiration date/time has been reached and/or so long as an assigned duration has not expired.
- attachment statuses of the removably attachable display panels 106 a - c relative to the electronic book viewer 102 and/or other electronic book viewers e.g., an electronic book viewer 202 of FIG.
- each display panel 106 a - c may individually enforce content protection policies based on whether it is operating in an attached mode with a “home” electronic book viewer (e.g., the electronic book viewer 102 ) and/or with a “visiting” electronic book viewer (e.g., an electronic book viewer 202 of FIG. 2 ) and based on whether they are operating in a detached-panel mode (or tablet mode).
- a “home” electronic book viewer e.g., the electronic book viewer 102
- a “visiting” electronic book viewer e.g., an electronic book viewer 202 of FIG. 2
- the service provider information technology (IT) policy server 128 is in communication with the network 118 and stores service subscription terms for mobile communication devices (e.g., the mobile device 104 ) and/or electronic book viewers (e.g., the electronic book viewer 102 ).
- service subscription terms indicate the types of services that are available or allowable to different subscribers based on, for example, subscriber contracts, per-use payments, service packages, etc.
- the mobile device 104 and/or the electronic book viewer 102 may register with the IT policy server 128 to receive authorization from the IT policy server 128 to present content on the electronic book viewer 102 .
- authorization from the IT policy server 128 may be conditional such that only certain types of content or particular content is authorized or permissible for displaying on the electronic book viewer 102 .
- policies from the IT policy server 128 may also indicate that the electronic book viewer 102 and/or the mobile device 104 hosting the electronic book viewer 102 must be in communication with the IT policy server 128 or other network entity of a service provider associated with the IT policy server 128 in order to present content on the electronic book viewer 102 .
- a removably attachable display panel 106 b of the electronic book viewer 102 is shown in three operating configurations relative to the electronic book viewer 102 (e.g., a “home” electronic book viewer) and an electronic book viewer 202 (e.g., a “visiting” electronic book viewer).
- the three operating configurations include a home attached mode configuration 204 a , a tablet mode configuration 204 b (e.g., a detached mode), and a visiting attached mode configuration 204 c .
- the removably attachable display panel 106 b is physically attached to a binding 206 (e.g., a binding element) of the electronic book viewer 102 (e.g., a home electronic book viewer).
- a binding 206 e.g., a binding element
- the binding 206 includes a processor system to enable obtaining and presenting content via the electronic book viewer 102 .
- the removably attachable display panel 106 b may be configured to operate in combination with the other display panels (e.g., the removably attachable display panels 106 a and 106 c ) of the electronic book viewer 102 such that, for example, the removably attachable display panels 106 a - c simulate physical pages of a traditional book.
- the other display panels e.g., the removably attachable display panels 106 a and 106 c
- the removably attachable display panel 106 b is physically detached from the electronic book viewer 102 and operates in a stand-alone configuration.
- the removably attachable display panel 106 b may be configured to present content in different manners depending on the hardware implementation of the removably attachable display panel 106 b .
- the removably attachable display panel 106 b may be provided with sufficient memory to store (e.g., to cache) and render a single page of content (for a single-sided display panel) or store and render two pages of content (for a dual-sided display panel).
- the removably attachable display panel 106 b may be configured to present only the content (or a portion of the content) that was last rendered when attached to an electronic book viewer (e.g., one of the electronic book viewers 102 and 202 ).
- the removably attachable display panel 106 b may be provided with sufficient memory to store multiple pages of content (or entire authored works) and a local processor to present such content independent of an electronic book viewer.
- the removably attachable display panel 106 b may instead be configured to keep content rendered on a display (e.g., through bi-stable ink technology or through display refresh techniques without having to locally cache the content).
- the removably attachable display panel 106 b is physically attached to a binding 208 (e.g., a binding element) of the electronic book viewer 202 (e.g., a “visiting” electronic book viewer).
- the visiting attached mode configuration 204 c may be used to share content from the electronic book viewer 102 with the electronic book viewer 202 .
- the removably attachable display panel 106 b is configured to communicate with processing logic in the binding 208 when in the visiting attached mode configuration 204 c . In this manner, the removably attachable display panel 106 b may transfer content and/or content protection policies to the binding 208 and/or receive content and/or content protection policies from the binding 208 .
- the removably attachable display panel 106 b may be configured to present content in the different mode configurations 204 a - c based on content protection policies.
- a content protection policy may specify different rules, provisions, or restrictions associated with the different modes 204 a - c .
- one rule of a content protection policy may specify that corresponding content may be displayed so long as a removably attachable display panel (e.g., the removably attachable display panel 106 b ) presenting the content is attached to a “home” electronic book viewer (e.g., the electronic book viewer 102 ), while a second rule of the same content protection policy may specify that the displayed content (or a portion of the displayed content) must no longer be displayed on the removably attachable display panel or deleted from the removably attachable display panel when it is operating in the tablet mode 204 b.
- a removably attachable display panel e.g., the removably attachable display panel 106 b
- a second rule of the same content protection policy may specify that the displayed content (or a portion of the displayed content) must no longer be displayed on the removably attachable display panel or deleted from the removably attachable display panel when it is operating in the tablet mode 204 b.
- Other content protection policies may specify that corresponding content may be displayed so long as a removably attachable display panel presenting the content is not attached to a ‘visited’ electronic book viewer (e.g., the electronic book viewer 202 ), and thus, the content may be presented while the display panel is attached to a “home” electronic book viewer (according to a first rule of a content protection policy) or while operating in a detached or tablet mode (e.g., the tablet mode configuration 204 b ) (according to a second rule of a content protection policy).
- a third rule of a content protection policy specifies that the displayed content must no longer be displayed or must be deleted from the removably attachable display panel when it is operating in the visiting attached mode 204 c.
- Some content protection policies may specify that corresponding content may be presented on a detached display panel (e.g., in the tablet mode configuration 204 b ) until the expiration of a specified duration following the detachment of the display panel. Similarly, some content protection policies may specify that corresponding content may be presented on a display panel until the expiration of a specified duration following the attachment of the display panel to a ‘visited’ electronic book viewer.
- FIG. 3 depicts the binding 206 and the removably attachable display panel 106 b of the electronic book viewer 102 of FIGS. 1 and 2 .
- the removably attachable display panel 106 b is shown detached from the binding 206 and includes an electro-mechanical connector 302 for mechanically and communicatively attaching and securing the removably attachable display panel 106 b to the binding 206 .
- the binding element 206 includes a binding processor system 304 that provides the binding element with communication, content storage, and content processing capabilities.
- the binding processor system 304 may be configured to communicate with the mobile device 104 via the wireless connection 108 of FIG.
- the binding 206 is provided with a battery 306 to power the binding processor system 304 .
- the battery 306 is rechargeable by connecting the binding 206 with an external power source (e.g., an alternating current (AC) or direct current (DC) power source).
- an external power source e.g., an alternating current (AC) or direct current (DC) power source.
- the removably attachable display panel 106 b is provided with a display panel subsystem 308 .
- the display panel subsystem 308 may be similar to the binding processor system 304 or may be provided with relatively less or more processing, communication, and/or storage capabilities than the binding processor system 304 .
- the removably attachable display panel 106 b is also provided with a battery 310 to power the display panel subsystem 308 .
- the battery 310 may be rechargeable and charged by the battery 306 or an external power source when the removably attachable display panel 106 b is attached to the binding 206 .
- An example apparatus that may be used to implement the binding processor system 304 and/or the display panel subsystem 308 is described below in connection with FIG. 9 .
- FIG. 4 depicts a plan view of the example binding 206 and the removably attachable display panel 106 b of FIGS. 2 and 3 in an interconnected configuration.
- the binding 206 is provided with a binding connector 402 to receive the electro-mechanical connector 302 to make mechanical and electrical contact between the removably attachable display panel 106 b and the binding 206 .
- Fastening the electro-mechanical connector 302 to the binding connector 402 causes engagement between electrical contacts 404 of the electro-mechanical connector 302 and the binding connector 402 .
- the electrical contacts 404 enable communications between the binding 206 and the removably attachable display panel 106 b and power transfer from the binding 206 to the removably attachable display panel 106 b .
- optical contacts may be employed instead of the electrical contacts 404 and/or the electrical contacts 404 may be used in combination with optical contacts.
- FIGS. 3 and 4 depict the binding 206 as a cylindrical structure, the binding 206 may alternatively be implemented using other structural configurations.
- attachment elements for mechanically and communicatively fastening or attaching the removably attachable display panel 106 b to the binding 206 may be implemented using fastening or connection structures other than the electro-mechanical connector 302 and the binding connector 402 depicted in FIGS. 3 and 4 .
- the binding processor system 304 and the display panel subsystem 308 may communicate with one another via wireless communications such that the removably attachable display panel 106 b may communicate with the binding 206 when in an attached mode (e.g., the home attached mode configuration 204 a of FIG. 2 ) or a detached mode (e.g., the tablet mode configuration 204 b of FIG. 2 ).
- FIG. 5 depicts a plan view of the example electronic book viewer 102 of FIGS. 1 and 2 .
- each of the removably attachable display panels 106 a - c is implemented as a double-sided display panel having opposing displays.
- Opposing displays of the display panel 106 b are indicated by reference numerals 502 and 504 .
- the opposing displays 502 and 504 enable content to be rendered on both faces of the removably attachable display panel 106 b .
- a sequentially next page in an electronic publication or document can be displayed on a display (e.g., the display 504 ) opposing the previously viewed display (e.g., the display 502 ) to simulate a paper-based reading experience.
- a display e.g., the display 504
- the previously viewed display e.g., the display 502
- the displays 502 and 504 may be implemented using any suitable display technology including, for example, e-paper, liquid crystal display (LCD), organic light emitting diode (OLED), etc. To operate using relatively little power, the displays 502 and 504 may preferably, but not necessarily, be implemented using e-paper.
- the removably attachable display panels 106 a - c may additionally be provided with touchscreens overlaid on the displays (e.g., the displays 502 and 504 ) to enable user input and control of the electronic book viewer 102 .
- the removably attachable display panels 106 a - c and/or the binding 206 may be provided with one or more user interface buttons or keys (not shown) to enable user-input and control of the electronic book viewer 102 .
- the removably attachable display panels 106 a - c are shown in an infinite rotation configuration relative to the binding 206 . That is, each of the removably attachable display panels 106 a - c is configured to rotate an infinite number of times about the binding 206 . Such an infinite rotation configuration may be advantageously used to simulate a reading experience similar to that of traditional paper-based books.
- the binding 206 may be configured to sense or detect when each of the display panels 106 a - c is turned in a page turning manner in, for example, a direction generally indicated by arrows 506 .
- the binding 206 may cause the visible displays (e.g., the displays 502 and 504 ) of the display panels 106 a - c to display sequentially next pages of an electronic publication or document. In this manner, users may progress or move through a multi-page publication or document by turning the display panels 106 a - c about the binding 206 .
- the infinite rotation capabilities of the display panels 106 a - c about the binding 206 provide an infinite number of page turns and, thus, the electronic book viewer 102 may be used to present multi-page publications or documents having any number of pages.
- the binding 206 may be provided with sensors (e.g., rotary encoders or magnetic sensors). Additionally or alternatively, the display panels 106 a - c may be provided with sensors to sense movement (e.g., accelerometers) and/or sensors to sense placement relative to one another. In some example implementations, the display panels 106 a - c may be provided with magnets and opposing reed switches to detect the positioning of the display panels 106 a - c adjacent one another and to detect when the display panels 106 a - c are moved away from one another.
- sensors e.g., rotary encoders or magnetic sensors.
- the display panels 106 a - c may be provided with sensors to sense movement (e.g., accelerometers) and/or sensors to sense placement relative to one another.
- the display panels 106 a - c may be provided with magnets and opposing reed switches to detect the positioning of the display panels 106 a - c adjacent one another and to detect when the
- the display panels 106 a - c may communicate or send turn page messages to the binding 206 .
- the turn page messages may also include the direction of that page turn so that the binding 206 can send next or previous page(s) content to the display panels 106 a - c to present to a user as if the user were turning a page of a traditional paper-based book.
- the removably attachable display panels 106 a - c of the electronic book viewer 102 of FIGS. 1 , 2 , and 5 may be configured to be arranged in vertical and/or horizontal paneling configurations.
- the display panels 106 a - c form a large continuous display and content may be presented by extending the rendered content across two or more displays of the removably attachable display panels 106 a - c .
- the extended content may be displayed along a horizontal plane or a vertical plane.
- the display panels 106 a - c may be provided with inter-connectable inter-panel communication interfaces 602 or connectors to enable mechanically fastening the display panels 106 a - c to one another and to provide inter-panel communications to send content and content protection policies to the display panels 106 a - c from the binding 206 .
- FIG. 7 depicts an example configuration for creating, storing, and accessing content protection policies associated with content presentable on the example electronic book viewer 102 of FIGS. 1 , 2 and 5 .
- the remote content protection policy data store 122 of the service provider content server 114 is shown as storing a credential data structure 702 (e.g., a credential database or table) and a content protection policy data structure 704 (e.g., content protection policy database or table).
- the credential data structure 702 stores credentials that may be used to verify content access permissions for different users and/or devices (e.g., the mobile device 104 and/or the electronic book viewer 102 ).
- the content protection policy data structure 704 stores access control permissions to control access to content for different users and/or devices.
- Data structures similar or identical to the credential data structure 702 and the content protection policy data structure 704 may also be stored in the local content protection policy data store 112 and/or the remote content protection policy data store 126 of FIG. 1 .
- the data structures 702 and 704 and their formats are shown merely by way of example. In other example implementations, the information described below as being stored in the data structures 702 and 704 may alternatively be formatted and/or arranged differently.
- the credential data structure 702 includes an identifier (ID) column 706 and a credential column 708 .
- ID column 706 may store unique identifiers (e.g., electronic serial numbers, media access control (MAC) identifiers, etc.) of electronic book viewers (e.g., the electronic book viewer 102 ) and/or mobile communication devices (e.g., the mobile device 104 ).
- MAC media access control
- the ID column 706 may store user identification information (e.g., a subscriber ID, a name, etc.).
- the credential column 708 stores credential information indicating the type of information that must be provided to confirm the identity of a device (e.g., the electronic book viewer 102 or the mobile device 104 ) or the identity of a user.
- credential information may be in the form of a username/password combination or other device-generated or user-provided secret information.
- the credential information may simply be an identifier stored in a corresponding entry of the ID column 706 indicating that an electronic book viewer or mobile communication device need only provide the ID stored in the ID column 706 to confirm the identity of the electronic book viewer or mobile communication device.
- the credential column 708 may store biometric or other user-recognition information user-identification information such as fingerprint minutiae data, facial recognition data, voice recognition data, gesture data (e.g., hand, finger, or stylus movement patterns across a touch panel interface), etc.
- the electronic book viewer 102 may be provided with credential sensors 710 as shown in FIG. 7 .
- the credential sensors 710 may be digital camera imagers, fingerprint sensors, microphones, etc.
- the credential sensors 710 may be provided only on the display panels 106 a - c , only on the binding 206 , or on the display panels 106 a - c and the binding 206 .
- the credential sensors 710 may acquire a snapshot of a person actively viewing (or exposed to) a display panel (e.g., one of the display panels 106 a - c ) and use the snapshot information to determine the identity of the person based on the credential information in the credential column 708 .
- the credential sensors 710 may acquire fingerprint information for fingerprint matching purposes.
- the credential sensors 710 may collect speech utterances for purposes of performing speaker recognition to identify persons.
- Enrollment of such biometric or user-recognition information may be performed via the electronic book viewer 102 , the mobile device 104 , or a home or office computer 712 and communicated to the service provider content server 114 for storing in the credential data structure 702 .
- the content protection policy data structure 704 includes an ID column 714 , a permissions column 716 , and a content ID column 718 .
- the ID column 714 is similar to the ID column 706 and can store user IDs for instances in which content protection and access control is implemented based on user identities or device IDs for instances in which content protection and access control is implemented based on device identities.
- the permissions column 716 stores rules defining the types of protections or access controls to be enforced for corresponding content
- the content ID column 718 stores identifiers of content corresponding to the rules in the permissions column 716 .
- particular content identified in the content ID column 718 is associated with corresponding rules stored in the permissions column 716 to control access by a device or user identified in ID column 714 , and the identity of the user or device identified in the ID column 714 is validated, verified, or confirmed based on credential information specified in a corresponding entry in the credential column 708 of the credential data structure 702 .
- credential requirements in the credential column 708 and permissions in the content protection policy data structure 704 may be user-created or user-specified via, for example, the electronic book viewer 102 , the mobile device 104 , and/or the computer 712 .
- credential information may identify family members of a household, extended family members, friends, co-workers, employees, etc. In this manner, end users may create content protection and access control permissions for family members or friends in a social environment or employees/co-workers in a professional work environment.
- the protection policies in the content protection policy data structure 704 may be enforced by electronic book viewers (e.g., the electronic book viewer 102 ) and/or processor systems in communication with the electronic book viewers such as, for example, the mobile device 104 .
- the content protection policies may be enforced using the binding processor system 304 and/or display panel sub-systems of the display panels 106 a - c (e.g., the display panel sub-system 308 of the display panel 106 b of FIG. 3 ).
- the protection policies may be enforced to protect or control access to content when such content is handled or shared using the attachable and detachable capabilities of the removably attachable display panels 106 a - c described above in connection with FIG. 2 .
- different protection policies may define different access control protections based on the home attached mode configuration 204 a , the tablet mode configuration 204 b , and the visiting attached mode configuration 204 c of FIG. 2 .
- protection policies in the content protection policy data structure 704 may be enforced when content is communicatively transmitted between electronic book viewers and/or processor systems in communication with the electronic book viewers such as, for example, the mobile device 104 .
- the electronic book viewer 102 may be configured to analyze and enforce protection policies in the content protection policy data structure 704 and wirelessly send shareable content 802 to the electronic book viewer 202 and/or to another mobile device 804 .
- the mobile device 104 may additionally or alternatively analyze and enforce protection policies in the content protection policy data structure 704 and wirelessly send shareable content 806 to the electronic book viewer 202 and/or to the mobile device 804 (or other processor system in communication with and hosting content for the electronic book viewer 202 ).
- the content identified in the content ID column 718 may identify user-authored content, which may include notes, comments, or markups related to another authored work.
- user-authored content may be protected using content protection and access control permissions different from those enforced for underlying original content (e.g., commercially available published works, medical records, legal documents, etc.).
- the removably attachable display panel 106 b has original content 902 displayed thereon and user-authored content 904 (e.g., user notes) displayed in overlaid fashion on the original content 902 .
- the original content 902 and the user-authored content 904 may be represented by two separate identifiers in the ID column 714 of FIG. 7 and are associated with separate content protection policies.
- a content protection policy for the original content 902 may indicate that the original content 902 is freely distributable or shareable with any person or device
- a content protection policy e.g., specified by a user
- the user-authored content 904 can only be displayed on a particular device or devices (e.g., identified by a particular device ID) or can only be displayed to a particular person or persons (e.g., identified based on some biometric or user identifier information specified in the credential column 708 of FIG. 7 ).
- an electronic book viewer e.g., the electronic book viewer 102
- an associated mobile communication device e.g., the mobile device 104
- may transfer the shareable content e.g., the original content 902
- non-shareable content e.g., the user-authored content 904
- the original content 902 is transferred to a display panel 906 of another electronic book viewer during a shareable content transfer session 908
- the user-authored content 904 is omitted from the transfer.
- the display panel subsystem 308 may enforce the content protection policy of the user-authored content 904 to cease the displaying thereof based on, for example, being detached (e.g., in the tablet mode configuration 204 b ), being attached to another binding (e.g., in the visiting mode configuration 204 c ), or being viewed by a non-authorized person.
- FIG. 9 shows the enforcement of a restrictive access control to only the user-authored content 204 in connection with the content transfer session 908
- the electronic book viewer 102 and/or the mobile device 104 may similarly protect access to original content or other content by first determining the types of protection or access control specified for the content prior to responding to a transfer request (e.g., a request to perform the shareable content transfer session 908 ). If a protection policy specifies that the content requested for transfer cannot be transferred, the electronic book viewer 102 and/or the mobile device 104 may display an explanation of such to a user.
- the mobile device 104 may deny the request for both the original content 902 and the user-authored content 904 if the content 902 and 904 is protected from display on the electronic book viewer 102 .
- the mobile device 104 may deny the request only for the user-authored content 904 but not the original content 902 if the mobile device 104 determines that the original content 902 is not protected from display on the electronic book viewer 102 , while the user-authored content 904 is protected from display on the electronic book viewer 102 .
- non-shareable content may be content that is part of the original content 902 .
- the person may specify that a personal identifier (e.g., a social security number) or certain medical history events in the original content not be transferred even though the remainder of the original content 902 is designated as transferable.
- non-transferable information in the original content 902 may appear as redacted or as blank when the original content 902 is rendered on the display panel 906 after the shareable content transfer session 908 .
- a person may indicate to only share a single page, column, paragraph, story, or any other desired portion without sharing an entire electronic book or publication.
- FIG. 10 depicts an example apparatus 1000 that may be used to implement the binding processor system 304 and/or the display panel subsystem 308 of FIG. 3 to implement the electronic book viewer 102 of FIGS. 1 , 2 , 5 , and 7 .
- some portions of the example apparatus 1000 may also be implemented in the mobile device 104 .
- the apparatus 1000 includes a processor 1002 that may be used to control the overall operation of the apparatus 1000 .
- the processor 1002 may be implemented using a controller, a general purpose processor, a digital signal processor, or any combination thereof.
- the apparatus 1000 also includes a protection policy enforcer 1004 , a credential verifier 1006 , an attachment status detector 1008 , and a panel motion analyzer 1010 .
- the protection policy enforcer 1004 may be used to analyze and enforce content protection policies (e.g., protection policies stored in the content protection policy data stores 112 , 122 , 126 of FIG. 1 and the content protection policy data structure 704 of FIG. 7 ) to protect or control access to content (e.g., content stored in the content data stores 110 , 120 , and 124 of FIG. 1 ).
- the credential verifier 1006 may be used to verify or validate credentials required by the credential requirements stored in the credential data structure 702 of FIG.
- the protection policy enforcer 1004 and the credential verifier 1006 may additionally or alternatively be implemented in a host device such as the mobile device 104 .
- the mobile device 104 can operate as an authorizing device to control/authorize access to content based on content protection policies and credentials (e.g., user and/or device credentials).
- the attachment status detector 1008 may be used to detect attached/detached operating modes (e.g., the home attached mode configuration 204 a , the tablet mode configuration 204 b , and the visiting attached mode configuration 204 c of FIG. 2 ) of the removably attachable display panels 106 a - c .
- the panel motion analyzer 1010 may be used to detect page turns of the removably attachable display panels 106 a - c to trigger the presentation of subsequent page content of an electronic book or document in response to a forward page turn event or trigger the presentation of previous page content of an electronic book or document in response to a backward page turn event.
- the protection policy enforcer 1004 , the credential verifier 1006 , the attachment status detector 1008 , and the panel motion analyzer 1010 may be implemented using any desired combination of hardware, firmware, and/or software. For example, one or more integrated circuits, discrete semiconductor components, and/or passive electronic components may be used. Thus, for example, the protection policy enforcer 1004 , the credential verifier 1006 , the attachment status detector 1008 , and the panel motion analyzer 1010 , or parts thereof, could be implemented using one or more circuit(s), programmable processor(s), application specific integrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)), field programmable logic device(s) (FPLD(s)), etc.
- ASIC application specific integrated circuit
- PLD programmable logic device
- FPLD field programmable logic device
- the protection policy enforcer 1004 , the credential verifier 1006 , the attachment status detector 1008 , and the panel motion analyzer 1010 , or parts thereof, may be implemented using instructions, code, and/or other software and/or firmware, etc. stored on a machine accessible medium and executable by, for example, a processor (e.g., the example processor 1002 ).
- a processor e.g., the example processor 1002
- at least one of the protection policy enforcer 1004 , the credential verifier 1006 , the attachment status detector 1008 , or the panel motion analyzer 1010 is hereby expressly defined to include a tangible medium such as a solid state memory, a magnetic memory, a DVD, a CD, etc.
- the apparatus 1000 is provided with one or more communication subsystem(s) 1012 to enable sending and receiving content and content protection policies.
- the communication subsystem(s) 1012 may be wired, wireless, or a combination thereof.
- the binding processor subsystem 304 and the display panel subsystem 308 may be provided with at least one wired communication subsystem (e.g., a serial interface) to enable exchanging information between the binding 206 and the removably attachable display panels 106 a - c .
- communications between the binding 206 and the removably attachable display panels 106 a - c may be performed via wireless communications.
- the binding processor subsystem 304 and the display panel subsystem 308 may be provided with wireless communication subsystems to communicate with the mobile device 104 ( FIGS.
- Example wireless communication technologies that may be employed to implement the one or more communication subsystem(s) 1012 include, for example, IEEE® 802.11 radio technology, BLUETOOTH® radio technology, ZIGBEE® radio technology, wireless USB radio technology, and ultra-wideband (UWB) radio technology.
- IEEE® 802.11 radio technology BLUETOOTH® radio technology
- ZIGBEE® radio technology ZIGBEE® radio technology
- wireless USB radio technology wireless USB radio technology
- UWB ultra-wideband
- the apparatus 1000 is also provided with a system memory 1014 and a mass storage memory 1016 .
- the system memory 1014 may be implemented using a volatile memory such as a random access memory (RAM) and used to store immediately available computer readable instructions and data (e.g., content presentable via the electronic book viewer 102 , content protection policies, etc.) to control the operation of the apparatus 1000 .
- the mass storage memory 1016 may be implemented using a non-volatile memory such as a flash memory and may be used as long-term storage of computer readable instructions and/or data (e.g., content presentable via the electronic book viewer 102 , content protection policies, etc.).
- the apparatus 1000 is provided with a display interface 1018 and a user input interface 1020 .
- the display interface 1018 can be an LCD display interface, an e-paper display interface, an organic light emitting diode (OLED) interface, etc.
- the user input interface 1020 could be an alphanumeric keyboard and/or telephone-type keypad, a multi-direction actuator or roller wheel with dynamic button pressing capability, a touch panel, individual keys/buttons, etc.
- the apparatus 1000 is a battery-powered device and is, thus, provided with a battery interface 1022 to interface with, for example, the battery 306 and/or the battery 310 of FIG. 3 .
- FIG. 11 depicts a block diagram of an example implementation of a processor system that may be used to implement the mobile device 104 .
- the mobile device 104 is a two-way communication device with advanced data communication capabilities including the capability to communicate with other mobile devices or computer systems through a network of transceiver stations.
- the mobile device 104 may also have the capability to allow voice communication.
- it may be referred to as a data messaging device, a two-way pager, a cellular telephone with data messaging capabilities, a smart phone, a wireless Internet appliance, or a data communication device (with or without telephony capabilities).
- FIG. 11 will now be described in detail.
- the mobile device 104 includes a number of components such as a main processor 1102 that controls the overall operation of the mobile device 104 . Communication functions, including data and voice communications, are performed through a communication subsystem 1104 .
- the communication subsystem 1104 receives messages from and sends messages to a wireless network 1105 .
- the communication subsystem 1104 is configured in accordance with the Global System for Mobile Communication (GSM) and General Packet Radio Services (GPRS) standards.
- GSM Global System for Mobile Communication
- GPRS General Packet Radio Services
- the GSM/GPRS wireless network is used worldwide and it is expected that these standards will be superseded eventually by Enhanced Data GSM Environment (EDGE) and Universal Mobile Telecommunications Service (UMTS).
- EDGE Enhanced Data GSM Environment
- UMTS Universal Mobile Telecommunications Service
- the wireless link connecting the communication subsystem 1104 with the wireless network 1105 represents one or more different Radio Frequency (RF) channels, operating according to defined protocols specified for GSM/GPRS communications. With newer network protocols, these channels are capable of supporting both circuit switched voice communications and packet switched data communications.
- RF Radio Frequency
- wireless network 1105 associated with mobile device 104 is a GSM/GPRS wireless network in one exemplary implementation
- other wireless networks may also be associated with the mobile device 104 in variant implementations.
- the different types of wireless networks that may be employed include, for example, data-centric wireless networks, voice-centric wireless networks, and dual-mode networks that can support both voice and data communications over the same physical base stations.
- Combined dual-mode networks include, but are not limited to, Code Division Multiple Access (CDMA) or CDMA2000 networks, GSM/GPRS networks (as mentioned above), and future third-generation (3G) networks like EDGE and UMTS.
- Some other examples of data-centric networks include WiFi 802.11, MOBITEX® and DATATAC® network communication systems.
- Examples of other voice-centric data networks include Personal Communication Systems (PCS) networks like GSM and Time Division Multiple Access (TDMA) systems.
- PCS Personal Communication Systems
- TDMA Time Division Multiple Access
- the main processor 1102 also interacts with additional subsystems such as a Random Access Memory (RAM) 1106 , a persistent memory 1108 (e.g., a non-volatile memory), a display 1110 , an auxiliary input/output (I/O) subsystem 1112 , a data port 1114 , a keyboard 1116 , a speaker 1118 , a microphone 1120 , short-range communications 1122 , and other device subsystems 1124 .
- RAM Random Access Memory
- persistent memory 1108 e.g., a non-volatile memory
- I/O subsystem 1112 e.g., a data port 1114
- keyboard 1116 e.g., a keyboard 1116
- speaker 1118 e.g., a speaker 1118
- microphone 1120 e.g., a microphone 1122 .
- the display 1110 and the keyboard 1116 may be used for both communication-related functions, such as entering a text message for transmission over the network 1105 , and device-resident functions such as a calculator or task list.
- the mobile device 104 can send and receive communication signals over the wireless network 1105 after required network registration or activation procedures have been completed.
- Network access is associated with a subscriber or user of the mobile device 104 .
- the mobile device 104 To identify a subscriber, the mobile device 104 requires a SIM/RUIM card 1126 (i.e. Subscriber Identity Module or a Removable User Identity Module) to be inserted into a SIM/RUIM interface 1128 in order to communicate with a network.
- SIM/RUIM card 1126 is one type of a conventional “smart card” that can be used to identify a subscriber of the mobile device 104 and to personalize the mobile device 104 , among other things. Without the SIM card 1126 , the mobile device 104 is not fully operational for communication with the wireless network 1105 .
- SIM card/RUIM 1126 By inserting the SIM card/RUIM 1126 into the SIM/RUIM interface 1128 , a subscriber can access all subscribed services. Services may include: web browsing and messaging such as e-mail, voice mail, Short Message Service (SMS), and Multimedia Messaging Services (MMS). More advanced services may include: point of sale, field service and sales force automation, content presentation via the electronic book viewer 102 ( FIGS. 1 , 2 , 5 , 7 , and 8 ).
- the SIM card/RUIM 1126 includes a processor and memory for storing information. Once the SIM card/RUIM 1126 is inserted into the SIM/RUIM interface 1128 , it is coupled to the main processor 1102 .
- the SIM card/RUIM 1126 can include some user parameters such as an International Mobile Subscriber Identity (IMSI).
- IMSI International Mobile Subscriber Identity
- An advantage of using the SIM card/RUIM 1126 is that a subscriber is not necessarily bound by any single physical mobile device.
- the SIM card/RUIM 1126 may store additional subscriber information for a mobile device as well, including datebook (or calendar) information and recent call information. Alternatively, user identification information can also be programmed into the persistent memory 1108 .
- the mobile device 104 is a battery-powered device and includes a battery interface 1132 for receiving one or more rechargeable batteries 1130 .
- the battery 1130 can be a smart battery with an embedded microprocessor.
- the battery interface 1132 is coupled to a regulator (not shown), which assists the battery 1130 in providing power V+ to the mobile device 104 .
- a regulator not shown
- future technologies such as micro fuel cells may provide the power to the mobile device 104 .
- the mobile device 104 also includes an operating system 1134 and software components 1136 to 1146 which are described in more detail below.
- the operating system 1134 and the software components 1136 to 1146 that are executed by the main processor 1102 are typically stored in a persistent store such as the persistent memory 1108 , which may alternatively be a read-only memory (ROM) or similar storage element (not shown).
- a persistent store such as the persistent memory 1108
- ROM read-only memory
- portions of the operating system 1134 and the software components 1136 to 1146 such as specific device applications, or parts thereof, may be temporarily loaded into a volatile store such as the RAM 1106 .
- Other software components can also be included, as is well known to those skilled in the art.
- the subset of software applications 1136 that control basic device operations, including data and voice communication applications, will normally be installed on the mobile device 104 during its manufacture.
- Other software applications include a message application 1138 that can be any suitable software program that allows a user of the mobile device 104 to send and receive electronic messages.
- Messages that have been sent or received by the user are typically stored in the persistent memory 1108 of the mobile device 104 or some other suitable storage element in the mobile device 104 .
- some of the sent and received messages may be stored remotely from the mobile device 104 such as in a data store of an associated host system that the mobile device 104 communicates with.
- the software applications can further include a device state module 1140 , a Personal Information Manager (PIM) 1142 , and other suitable modules (not shown).
- the device state module 1140 provides persistence (i.e., the device state module 1140 ensures that important device data is stored in persistent memory, such as the persistent memory 1108 , so that the data is not lost when the mobile device 104 is turned off or loses power).
- the PIM 1142 includes functionality for organizing and managing data items of interest to the user, such as, but not limited to, e-mail, contacts, calendar events, voice mails, appointments, and task items.
- a PIM application has the ability to send and receive data items via the wireless network 1105 .
- PIM data items may be seamlessly integrated, synchronized, and updated via the wireless network 1105 with the mobile device subscriber's corresponding data items stored and/or associated with a host computer system. This functionality creates a mirrored host computer on the mobile device 104 with respect to such items. This can be particularly advantageous when the host computer system is the mobile device subscriber's office computer system.
- the mobile device 104 also includes a connect module 1144 , and an IT policy module 1146 .
- the connect module 1144 implements the communication protocols that are required for the mobile device 104 to communicate with the wireless infrastructure and any host system, such as an enterprise system, that the mobile device 104 is authorized to interface with.
- the connect module 1144 includes a set of APIs that can be integrated with the mobile device 104 to allow the mobile device 104 to use any number of services associated with the enterprise system.
- the connect module 1144 allows the mobile device 104 to establish an end-to-end secure, authenticated communication pipe with the host system.
- a subset of applications for which access is provided by the connect module 1144 can be used to pass IT policy commands from the host system (e.g., from the IT policy server 128 ( FIG. 1 ) of a host system) to the mobile device 104 . This can be done in a wireless or wired manner.
- These instructions can then be passed to the IT policy module 1146 to modify the configuration of the mobile device 104 and/or the electronic book viewer 102 .
- the IT policy update can also be done over a wired connection.
- the IT policy module 1146 receives IT policy data that encodes the IT policy.
- the IT policy module 1146 then ensures that the IT policy data is authenticated by the mobile device 104 .
- the IT policy data can then be stored in the flash memory 1106 in its native form. After the IT policy data is stored, a global notification can be sent by the IT policy module 1146 to all of the applications residing on the mobile device 104 . Applications for which the IT policy may be applicable then respond by reading the IT policy data to look for IT policy rules that are applicable.
- the IT policy module 1146 can include a parser (not shown), which can be used by the applications to read the IT policy rules. In some cases, another module or application can provide the parser. Grouped IT policy rules, described in more detail below, are retrieved as byte streams, which are then sent (recursively, in a sense) into the parser to determine the values of each IT policy rule defined within the grouped IT policy rule. In at least some embodiments, the IT policy module 1146 can determine which applications (e.g., a media content application for communicating with the electronic book viewer 102 of FIGS. 1 , 2 , 5 , 7 , and 8 ) are affected by the IT policy data and send a notification to only those applications. In either of these cases, for applications that aren't running at the time of the notification, the applications can call the parser or the IT policy module 1146 when they are executed to determine if there are any relevant IT policy rules in the newly received IT policy data.
- applications e.g., a media content application for communicating with
- All applications that support rules in the IT Policy are coded to know the type of data to expect.
- the value that is set for the “WEP User Name” IT policy rule is known to be a string; therefore the value in the IT policy data that corresponds to this rule is interpreted as a string.
- the setting for the “Set Maximum Password Attempts” IT policy rule is known to be an integer, and therefore the value in the IT policy data that corresponds to this rule is interpreted as such.
- the IT policy module 1146 sends an acknowledgement back to the host system to indicate that the IT policy data was received and successfully applied.
- software applications can also be installed on the mobile device 104 .
- These software applications can be third party applications, which are added after the manufacture of the mobile device 104 .
- third party applications include games, calculators, utilities, etc.
- the additional applications can be loaded onto the mobile device 104 through at least one of the wireless network 1105 , the auxiliary I/O subsystem 1112 , the data port 1114 , the short-range communications subsystem 1122 , or any other suitable device subsystem 1124 .
- This flexibility in application installation increases the functionality of the mobile device 104 and may provide enhanced on-device functions, communication-related functions, or both.
- secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using the mobile device 104 .
- the data port 1114 enables a subscriber to set preferences through an external device or software application and extends the capabilities of the mobile device 104 by providing for information or software downloads to the mobile device 104 other than through a wireless communication network.
- the alternate download path may, for example, be used to load an encryption key onto the mobile device 104 through a direct and thus reliable and trusted connection to provide secure device communication.
- the data port 1114 can be any suitable port that enables data communication between the mobile device 104 and another computing device.
- the data port 1114 can be a serial or a parallel port.
- the data port 1114 can be a USB port that includes data lines for data transfer and a supply line that can provide a charging current to charge the battery 1130 of the mobile device 104 .
- the short-range communications subsystem 1122 provides for communication between the mobile device 104 and different systems or devices, without the use of the wireless network 1105 .
- the subsystem 1122 may include an infrared device and associated circuits and components for short-range communication.
- Examples of short-range communication standards include standards developed by the Infrared Data Association (IrDA), Bluetooth, and the 802.11 family of standards developed by IEEE.
- a received signal such as a text message, an e-mail message, web page download, media content for presenting via the electronic book viewer 102 ( FIGS. 1 , 2 , 3 , 5 , 7 , and 8 ) will be processed by the communication subsystem 1104 and input to the main processor 1102 .
- the main processor 1102 will then process the received signal for output to the display 1110 (or a display of the electronic book viewer 102 ) or alternatively to the auxiliary I/O subsystem 1112 .
- a subscriber may also compose data items, such as e-mail messages, for example, using the keyboard 1116 in conjunction with the display 1110 and possibly the auxiliary I/O subsystem 1112 .
- the auxiliary subsystem 1112 may include devices such as: a touch screen, mouse, track ball, infrared fingerprint detector, or a roller wheel with dynamic button pressing capability.
- the keyboard 1116 is preferably an alphanumeric keyboard and/or telephone-type keypad. However, other types of keyboards may also be used.
- a composed item may be transmitted over the wireless network 1105 through the communication subsystem 1104 .
- the overall operation of the mobile device 104 is substantially similar, except that the received signals are output to the speaker 1118 , and signals for transmission are generated by the microphone 1120 .
- Alternative voice or audio I/O subsystems such as a voice message recording subsystem, can also be implemented on the mobile device 104 .
- voice or audio signal output is accomplished primarily through the speaker 1118 , the display 1110 can also be used to provide additional information such as the identity of a calling party, duration of a voice call, or other voice call related information.
- FIGS. 12 and 13 depict example flow diagrams representative of processes that may be implemented using, for example, computer readable instructions that may be used to display content on the electronic book viewer in accordance with content protection policies and to transfer content between electronic book readers and/or host devices in accordance with content protection policies.
- the example processes of FIGS. 12 and 13 may be performed using one or more processors, controllers, and/or any other suitable processing devices.
- the example processes of FIGS. 12 and 13 may be implemented using coded instructions (e.g., computer readable instructions) stored on one or more tangible computer readable media such as flash memory, read-only memory (ROM), and/or random-access memory (RAM).
- the term tangible computer readable medium is expressly defined to include any type of computer readable storage and to exclude propagating signals. Additionally or alternatively, the example processes of FIGS. 12 and 13 may be implemented using coded instructions (e.g., computer readable instructions) stored on one or more non-transitory computer readable media such as flash memory, read-only memory (ROM), random-access memory (RAM), cache, or any other storage media in which information is stored for any duration (e.g., for extended time periods, permanently, brief instances, for temporarily buffering, and/or for caching of the information). As used herein, the term non-transitory computer readable medium is expressly defined to include any type of computer readable medium and to exclude propagating signals.
- coded instructions e.g., computer readable instructions
- non-transitory computer readable media such as flash memory, read-only memory (ROM), random-access memory (RAM), cache, or any other storage media in which information is stored for any duration (e.g., for extended time periods, permanently, brief instances, for temporarily buffer
- FIGS. 12 and 13 may be implemented using any combination(s) of application specific integrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)), field programmable logic device(s) (FPLD(s)), discrete logic, hardware, firmware, etc. Also, some or all of the example processes of FIGS. 12 and 13 may be implemented manually or as any combination(s) of any of the foregoing techniques, for example, any combination of firmware, software, discrete logic and/or hardware. Further, although the example processes of FIGS. 12 and 13 are described with reference to the flow diagrams of FIGS. 12 and 13 , other methods of implementing the processes of FIGS. 12 and 13 may be employed.
- ASIC application specific integrated circuit
- PLD programmable logic device
- FPLD field programmable logic device
- any or all of the example processes of FIGS. 12 and 13 may be performed sequentially and/or in parallel by, for example, separate processing threads, processors, devices, discrete logic, circuits, etc.
- the depicted flow diagram is representative of an example process that may be used to display content on the electronic book viewer in accordance with content protection policies.
- the example process is described below as being performed by the electronic book viewer 102 as implemented using the apparatus 1000 of FIG. 10 .
- the example process may alternatively be performed by the mobile device 104 while in communication with the electronic book viewer 102 and controlling operations of the electronic book viewer 102 .
- the mobile device 104 may communicate wirelessly with the binding 206 ( FIG. 2 ) and/or with each of the removably attachable display panels 106 a - c to detect attachable/detachable status thereof and control/authorize presentation of content thereby.
- the electronic book viewer 102 receives content (block 1202 ) via, for example, the communication interface 1012 of FIG. 10 .
- the electronic book viewer 102 may receive content from any of the content data stores 110 , 120 , and 124 of FIG. 1 via the mobile device 104 .
- the electronic book viewer 102 stores the content locally in one or more of the display panels 106 a - c of FIGS. 1 , 2 , 5 , and 6 (block 1204 ).
- the electronic book viewer 102 can store the content in the system memory 1014 or the mass memory 1016 (FIG. 10 ).
- the electronic book viewer 102 receives a corresponding content protection policy (block 1206 ) via, for example, the communication interface 1012 .
- the electronic book viewer 102 may receive content from any of the content protection policy data stores 112 , 122 , and 126 of FIG. 1 via the mobile device 104 .
- the electronic book viewer 102 stores the content protection policy locally in one or more of the display panels 106 a - c having corresponding content stored therein (block 1208 ).
- the electronic book viewer 102 can store the content protection policy in the system memory 1014 or the mass memory 1016 .
- the electronic book viewer 102 uses the protection policy enforcer 1004 to determine whether the received content can be presented based on its corresponding content protection policy (block 1210 ).
- the protection policy enforcer 1004 may determine whether the content protection policy allows the content to be presented on the electronic book viewer 102 based on, for example, a credential (e.g., a user ID, a device ID, etc.), an access control rule (e.g., date/time, duration, payment, etc.), or any other access control criteria.
- a credential e.g., a user ID, a device ID, etc.
- an access control rule e.g., date/time, duration, payment, etc.
- the credential verifier 1006 FIG.
- content protection policies may specify that corresponding content may be presented only when an electronic book viewer is within communication range of a host device (e.g., the mobile device 104 ) and/or in communication with a service provider network of the host device.
- Some content protection policies may specify that a service policy from, for example, the IT policy server 128 of FIG. 1 allows or authorizes the content to be displayed on the electronic book viewer 102 (e.g., the content is not protected from being displayed on the electronic book viewer 102 ).
- the protection policy enforcer 1004 determines that the content may be presented (block 1210 )
- the electronic book viewer 102 presents the content via one or more of the removably attachable display panels 106 a - c (block 1212 ).
- the attachment status detector 1008 ( FIG. 10 ) (in the binding 206 or in each of the display panels 106 a - c ) determines whether a display panel attachment status has changed (block 1214 ) for any of the display panels 106 a - c .
- the attachment status may be indicative of a display panel 106 a - c being in the home attached mode configuration 204 a , the tablet mode configuration 204 b , or the visiting attached mode configuration 204 c of FIG. 2 .
- the attachment status detector 1008 identifies the attachment status of one of the display panels 106 a - c associated with the attachment status change (block 1216 ).
- the protection policy enforcer 1004 selects a content protection operation (e.g., a rule, provision, or restriction from the content protection policy received at block 1206 ) corresponding to the identified attachment status (block 1218 ) and enforces the content protection policy for the presented content based on the selected content protection operation (block 1220 ).
- a content protection operation e.g., a rule, provision, or restriction from the content protection policy received at block 1206
- the content protection operation may indicate that the content should be removed immediately or after a specified duration in response to the attachment status change.
- the content protection operation may indicate that the content can remain displayed while the display panel 106 a - c is in the identified attachment status.
- the electronic book viewer 102 After enforcing the content protection policy (block 1220 ) or if the attachment status has not changed (block 1214 ) or if the content is not to be presented (block 1210 ), the electronic book viewer 102 (or the display panels 106 a - c ) determines whether it should continue to wait for an attachment status change (or another attachment status change) (block 1224 ). If the electronic book viewer 102 determines that it should continue to wait for an attachment status change (e.g., the content remains displayed) (block 1224 ) control returns to block 1210 . At block 1210 , the protection policy enforcer 1004 can re-evaluate whether it should continue to present the content or present content that was not previously presentable.
- the protection policy enforcer 1004 may determine that content should no longer be presented when any criteria or rule associated with a corresponding protection policy is being violated (e.g., a duration has expired, a date/time has passed, the electronic book viewer 102 is no longer within communication range of the mobile device 104 and/or is no longer in communication with a service provider network, a user or device credential is no longer present or valid, etc.).
- any criteria or rule associated with a corresponding protection policy e.g., a duration has expired, a date/time has passed, the electronic book viewer 102 is no longer within communication range of the mobile device 104 and/or is no longer in communication with a service provider network, a user or device credential is no longer present or valid, etc.
- the depicted flow diagram is representative of an example process that may be used to transfer content between electronic book viewers and/or host devices (e.g., the mobile devices 104 and 804 shown in FIG. 8 ) in accordance with content protection policies.
- the example process is described as being performed by the electronic book reader 102 as implemented using the example apparatus 1000 of FIG. 10 , the example process may instead be performed by a host device such as the mobile device 102 as described above in connection with FIG. 8 .
- the electronic book reader 102 receives a content transfer request (block 1302 ).
- the content transfer request may request to transfer one or more content instances associated with the same or different content protection policies.
- the protection policy enforcer 1004 retrieves one or more corresponding content protection policies (block 1304 ) and determines whether any of the content requested for transfer is transferable (e.g., shareable) (block 1306 ).
- the one or more retrieved content protection policies may indicate that some of the content requested for transfer is shareable with others (e.g., not protected from displaying on an electronic book viewer of a target recipient), while one or more of the content protection policies may indicate that some of the content is not shareable with anyone (e.g., protected from displaying on an electronic book viewer of a target recipient).
- the original content 902 may be shareable, while the user-authored content 904 may not be shareable.
- determining whether the requested content may be transferred involves confirming that a service policy from, for example, the IT policy server 128 of FIG. 1 protects the content from being displayed on an electronic book viewer of a target recipient.
- the protection policy enforcer 1004 determines whether any of the content is non-transferable (i.e., not shareable). If there is any content that is non-transferable (block 1308 ), the electronic book viewer 102 sends only the transferable content identified at block 1306 to a target destination (e.g., to the electronic book viewer 202 of FIGS. 2 and 8 or to the mobile device 804 of FIG. 8 ) and omits the non-transferable content identified at block 1308 (block 1310 ).
- a target destination e.g., to the electronic book viewer 202 of FIGS. 2 and 8 or to the mobile device 804 of FIG. 8
- the electronic book viewer 102 determines that none of the content requested for transfer is non-transferable (block 1308 )
- the electronic book viewer 102 sends all of the selected content to the target destination (block 1312 ).
- the electronic book viewer 102 determines that none of the content requested for transfer is transferable (block 1306 )
- the electronic book viewer 102 denies the content transfer request (block 1314 ) by, for example, presenting a message via one of the removably attachable display panels 106 a - c.
Abstract
Description
- The present disclosure relates generally to mobile media devices and, more particularly, to methods and apparatus to implement electronic book viewers.
- Electronic books (e-books) are typically digital publications that may be stored in and displayed via different types of electronic devices including stationary and portable devices. Some known e-book readers are software applications installed in processor systems such as computers or portable devices, while other e-book readers are dedicated devices that provide functionality specifically tailored for reading published works in electronic format. Some known portable electronic devices for displaying e-books are e-book readers, personal digital assistants, and smart phones. Acquiring e-books may involve purchasing and downloading from an online store or purchasing e-books stored on a removable storage medium.
-
FIG. 1 depicts an example electronic book viewer shown with a mobile communication device and local and remote content data stores. -
FIG. 2 depicts an example removably attachable display panel configured to operate in multiple modes and interchangeable for sharing between the example electronic book viewer ofFIG. 1 and another example electronic book viewer. -
FIG. 3 depicts an example binding element and an example removably attachable display panel of the electronic book viewer ofFIGS. 1 and 2 . -
FIG. 4 depicts a plan view of the example binding element and removably attachable display panel ofFIG. 3 in an interconnected configuration. -
FIG. 5 depicts a plan view of the example electronic book viewer ofFIGS. 1 and 2 . -
FIG. 6 depicts the example electronic book viewer ofFIGS. 1 , 2, and 5 in an example paneling configuration. -
FIG. 7 depicts an example configuration for creating, storing, and accessing content protection policies associated with content presentable on the example electronic book viewer ofFIGS. 1 , 2, and 5. -
FIG. 8 depicts example manners of communicating content between electronic book viewers, between host devices, and between host devices and electronic book viewers. -
FIG. 9 depicts an example manner of transferring shareable content between electronic book viewers without sharing non-shareable content. -
FIG. 10 depicts an example apparatus that may be used to implement the electronic book viewer ofFIGS. 1 , 2, 3, 5, 7, and 8. -
FIG. 11 depicts an example block diagram of the mobile device ofFIGS. 1 , 7, and 8. -
FIG. 12 depicts an example flow diagram representative of computer readable instructions that may be used to display content on the electronic book viewer in accordance with content protection policies. -
FIG. 13 depicts an example flow diagram representative of computer readable instructions that may be used to transfer content between electronic book readers and/or host devices in accordance with content protection policies. - Although the following discloses example methods and apparatus including, among other components, software executed on hardware, it should be noted that such methods and apparatus are merely illustrative and should not be considered as limiting. For example, it is contemplated that any or all of these hardware and software components could be embodied exclusively in hardware, exclusively in software, exclusively in firmware, or in any combination of hardware, software, and/or firmware. Accordingly, while the following describes example methods and apparatus, persons having ordinary skill in the art will readily appreciate that the examples provided are not the only way to implement such methods and apparatus.
- It will be appreciated that for simplicity and clarity of illustration, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein may be practiced without these specific details. In other instances, well-known methods, procedures and components have not been described in detail so as not to obscure the embodiments described herein. Also, the description is not to be considered as limiting the scope of the embodiments described herein.
- The example methods and apparatus described herein may be used to implement electronic book viewers to display content including electronically published/stored books, electronically stored documents, web-based content, and/or any other content. In some example implementations, an electronic book viewer implemented in accordance with the example methods and apparatus disclosed herein may be a multi-page electronic book viewer including two or more display panels, which may be single-sided or dual-sided display panels. In some example implementations, the multi-page electronic book viewer may be adapted to include removably attachable display panels to facilitate after-market re-configurations thereof by adding additional display panels thereto and/or removing display panels therefrom. In addition, some example display panels may be configured to be physically interchanged or shared between two or more multi-page electronic book viewers. Such physically interchangeable display panels may be used to facilitate sharing content between different electronic book viewers.
- The example electronic book viewers disclosed herein may be configured to display unprotected content (e.g., open content) and protected content. Protected content may include content protected from undesired or impermissible distribution or accessibility. Some content may be protected from being displayed on some electronic book viewers (or to particular users or types of users), while not being protected from displaying on other electronic book viewers (or to particular users or types of users). To protect the distribution or accessibility of such content, the example methods and apparatus disclosed herein may be used to create, store, access, and/or enforce content protection policies. Such content protection policies may be pre-defined or commercially available protection policies or end-user-created protection policies. Pre-defined protection policies may be created by, for example, content publishers prior to publishing electronically presentable content (e.g., electronic books, web content, and/or other media). End-user-created protection policies may be created by, for example, end users of electronic book viewers or other individual persons that generate documents or supplemental information to pre-existing documents and desire to protect their documents or supplemental information from access by persons other than those for which permissions are specifically granted.
- The example methods and apparatus disclosed herein may be used to enforce content protection policies using one or more content protection enforcement techniques. For example, some content protection techniques may involve conditional transmission/reception of content between two or more electronic book viewers depending on protection policies of content and permissions associated with target recipients. Other example content protection techniques may be based on capabilities of display panels to be removably attachable to separate electronic book viewers by conditionally presenting content based on an attachment status of a display panel to an electronic book viewer. Such content protection techniques and others disclosed herein may be used in connection with an electronic document or published work in its entirety or in piecemeal fashion on portions (e.g., individual pages) of such documents or published works.
- In addition, for user-authored works that are supplemental to pre-existing authored works, the example methods and apparatus disclosed herein enable enforcing user-created content protection policies for such user-authored works separately from content protection policies of the pre-existing authored works. For example, pre-existing authored works may include electronically published books, official documents (e.g., medical records, legal documents, etc.), etc., and user-authored works may be user-created documents or messages, user notes, comments, and/or markups created by an end user regarding the content of the pre-existing authored works. Content protection policies for a pre-existing authored work may be relatively more open than user-created content protection policies for user-authored notes or supplemental information regarding the content of such pre-existing authored work. Thus, the example methods and apparatus disclosed herein may be used to allow sharing the original pre-existing authored work with others while hiding or protecting the corresponding user-authored works from viewing by non-authorized or non-permitted persons.
- In some example implementations, the example methods and apparatus described herein may be used in connection with mobile communication devices, mobile computing devices, or any other device capable of communicating wirelessly with a wireless network. Such devices, also referred to as terminals, wireless terminals, or user equipment (UE), may include mobile smart phones (e.g., a BlackBerry® smart phone), wireless personal digital assistants (PDA), laptop/notebook/netbook computers with wireless adapters, etc.
-
FIG. 1 depicts an exampleelectronic book viewer 102 shown with a mobile device 104 (e.g., a mobile communication device) and local and remote content data stores. In the illustrated example, theelectronic book viewer 102 includes removably attachable display panels 106 a-c configured to turn like pages of a book. As described in greater detail below, each of the removably attachable display panels 106 a-c may be removed from theelectronic book viewer 102 and operate as a stand-alone display in an unattached mode (e.g., a tablet mode). In addition, each of the removably attachable display panels 106 a-c may be attached to other electronic book viewers (e.g., anelectronic book viewer 202 ofFIG. 2 ) to, for example, share content between different users. - In the illustrated example of
FIG. 1 , theelectronic book viewer 102 is shown in communication with themobile device 104 via a wireless communication connection 108 (e.g., a Bluetooth® connection, a WiFi connection, etc.) and is configured to exchange content and content protection policies with themobile device 104. In the illustrated example, themobile device 104 is a content and content protection policy host for theelectronic book viewer 102. For example, as shown inFIG. 1 , themobile device 104 may include a localcontent data store 110 and a local content protectionpolicy data store 112. In the illustrated example, theelectronic book viewer 102 is configured to present media (e.g., text, graphics, video, audio, etc.) stored in and/or retrieved from the localcontent data store 110 of themobile device 104. In some example implementations, theelectronic book viewer 102 may also be configured to operate as an external display for themobile device 104 to present content ordinarily presented on a display of the mobile device 104 (e.g., mobile device applications, emails, address book entries, etc.). In other example implementations, theelectronic book viewer 102 may operate in connection with other types of hosts other than themobile device 104. Such other hosts may be any other type of processor systems including computers, personal digital assistants (PDAs), servers, etc. - The local
content data store 110 may store pre-existing and/or published authored works (e.g., e-books, official documents, webpage content, etc.) or user-authored works (e.g., user-created documents, user-created media, emails, calendar appointments, supplemental notes, markups, comments, etc.). The local content protectionpolicy data store 112 may store content protection policies for the content stored in the localcontent data store 110. Although the local content protectionpolicy data store 112 is shown separate from the localcontent data store 110, in some example implementations, content protection policies and corresponding content may be stored together in the same data store. For example, a file or database storing content may also store the protection policies corresponding to that content. - In the illustrated example of
FIG. 1 , themobile device 104 may be implemented using a mobile/cellular phone, a smart phone, or any other personal communication device and may be configured to communicate with network entities such asremote content servers mobile device 104 may operate as a host device to serve content and content protection policies to theelectronic book viewer 102. In addition, themobile device 104 may operate as an authorizing device that analyzes content protection policies and authorizes theelectronic book viewer 102 to present content in accordance with such protection policies. In some example implementations, theelectronic book viewer 102 and themobile device 104 may share enforcement responsibilities of content protection policies. - In the illustrated example, the
content server 114 is a service provider content server (e.g., a content server owned and/or operated by a communication service provider servicing and maintaining a subscription for the mobile device 104) and includes a remotecontent data store 120 and a remote content protectionpolicy data store 122. Thecontent server 116 is a third-party content server (e.g., a content server that stores and serves electronic books or other media electronically published and distributed by a media content provider) and includes a remotecontent data store 124 and a remote content protectionpolicy data store 126. - In some example implementations, the
mobile device 104 may operate as a proxy or intermediate communication device between theelectronic book viewer 102 and the remotecontent data stores mobile device 104 may retrieve content from the remotecontent data stores content data store 110 for presentation via theelectronic book viewer 102. Additionally or alternatively, network-stored content is not stored locally in the localcontent data store 110 but is instead streamed to theelectronic book viewer 102. Content retrieval may or may not be based on a content subscription. - In the illustrated example, the local
content data store 110 and the remotecontent data stores electronic book viewer 102 is configured to receive and enforce corresponding content protection policies from the local content protectionpolicy data store 112 and/or the remote content protectionpolicy data stores mobile device 104 may process the content protection policies and instruct theelectronic book viewer 102 regarding the manner in which to enforce such protection policies. - In some example implementations, content protection policies stored in the content protection
policy data stores electronic book viewer 102 or removably attachable display panels 106 a-c of theelectronic book viewer 102. Such modes or scenarios may include attachment statuses of the removably attachable display panels 106 a-c to thebinding element 206, proximity of theelectronic book viewer 102 to themobile device 104, a connection between theelectronic book viewer 102 and a service provider information technology (IT)policy server 128, a connection between themobile device 104 and the service providerIT policy server 128, permissions in the service providerIT policy server 128 for theelectronic book viewer 102 and/or themobile device 104, content expiration times, etc. - Content protection policies may be implemented based on different types of protection conditions including conditions associated with a unique identifier of the
electronic book viewer 102 and/or themobile device 104, proximity of theelectronic book viewer 102 to themobile device 104, connection status of themobile device 104 or theelectronic book viewer 102 with a service provider network, date/time, duration, attachment statuses of the removably attachable display panels 106 a-c relative to theelectronic book viewer 102, and/or any other types of conditions. - For content protection policies based on a unique identifier of the
electronic book viewer 102 and/or themobile device 104, theelectronic book viewer 102 may present content so long as a unique identifier of theelectronic book viewer 102 and/or themobile device 104 matches a unique identifier stored in association with a corresponding protection policy of the content. For content protection policies based on the proximity of theelectronic book viewer 102 to themobile device 104, theelectronic book viewer 102 may present protected content so long as it is within wireless communication range of themobile device 104 and/or connected to a service provider network via themobile device 104. That is, when theelectronic book viewer 102 is no longer within communication range of themobile device 104, theelectronic book viewer 102 may be configured to cease presentation of the protected content. For content protection policies based on date/time and/or duration, theelectronic book viewer 102 may be configured to present protected content until an expiration date/time has been reached and/or so long as an assigned duration has not expired. As described in detail below in connection withFIG. 2 , for content protection policies based on attachment statuses of the removably attachable display panels 106 a-c relative to theelectronic book viewer 102 and/or other electronic book viewers (e.g., anelectronic book viewer 202 ofFIG. 2 ), each display panel 106 a-c may individually enforce content protection policies based on whether it is operating in an attached mode with a “home” electronic book viewer (e.g., the electronic book viewer 102) and/or with a “visiting” electronic book viewer (e.g., anelectronic book viewer 202 ofFIG. 2 ) and based on whether they are operating in a detached-panel mode (or tablet mode). - In the illustrated example, the service provider information technology (IT)
policy server 128 is in communication with thenetwork 118 and stores service subscription terms for mobile communication devices (e.g., the mobile device 104) and/or electronic book viewers (e.g., the electronic book viewer 102). Such service subscription terms indicate the types of services that are available or allowable to different subscribers based on, for example, subscriber contracts, per-use payments, service packages, etc. In some example implementations, themobile device 104 and/or theelectronic book viewer 102 may register with theIT policy server 128 to receive authorization from theIT policy server 128 to present content on theelectronic book viewer 102. In some instances, authorization from theIT policy server 128 may be conditional such that only certain types of content or particular content is authorized or permissible for displaying on theelectronic book viewer 102. In addition, policies from theIT policy server 128 may also indicate that theelectronic book viewer 102 and/or themobile device 104 hosting theelectronic book viewer 102 must be in communication with theIT policy server 128 or other network entity of a service provider associated with theIT policy server 128 in order to present content on theelectronic book viewer 102. - Turning to
FIG. 2 , a removablyattachable display panel 106 b of theelectronic book viewer 102 is shown in three operating configurations relative to the electronic book viewer 102 (e.g., a “home” electronic book viewer) and an electronic book viewer 202 (e.g., a “visiting” electronic book viewer). The three operating configurations include a home attachedmode configuration 204 a, atablet mode configuration 204 b (e.g., a detached mode), and a visiting attachedmode configuration 204 c. In the home attachedmode configuration 204 a, the removablyattachable display panel 106 b is physically attached to a binding 206 (e.g., a binding element) of the electronic book viewer 102 (e.g., a home electronic book viewer). As discussed in detail below in connection withFIG. 3 , the binding 206 includes a processor system to enable obtaining and presenting content via theelectronic book viewer 102. - In the home attached
mode configuration 204 a, the removablyattachable display panel 106 b may be configured to operate in combination with the other display panels (e.g., the removablyattachable display panels electronic book viewer 102 such that, for example, the removably attachable display panels 106 a-c simulate physical pages of a traditional book. - In the
tablet mode configuration 204 b, the removablyattachable display panel 106 b is physically detached from theelectronic book viewer 102 and operates in a stand-alone configuration. In thetablet mode configuration 204 b, the removablyattachable display panel 106 b may be configured to present content in different manners depending on the hardware implementation of the removablyattachable display panel 106 b. For example, the removablyattachable display panel 106 b may be provided with sufficient memory to store (e.g., to cache) and render a single page of content (for a single-sided display panel) or store and render two pages of content (for a dual-sided display panel). In such example implementations, the removablyattachable display panel 106 b may be configured to present only the content (or a portion of the content) that was last rendered when attached to an electronic book viewer (e.g., one of theelectronic book viewers 102 and 202). In other example implementations, the removablyattachable display panel 106 b may be provided with sufficient memory to store multiple pages of content (or entire authored works) and a local processor to present such content independent of an electronic book viewer. In yet other example implementations, the removablyattachable display panel 106 b may instead be configured to keep content rendered on a display (e.g., through bi-stable ink technology or through display refresh techniques without having to locally cache the content). - In the visiting attached
mode configuration 204 c, the removablyattachable display panel 106 b is physically attached to a binding 208 (e.g., a binding element) of the electronic book viewer 202 (e.g., a “visiting” electronic book viewer). The visiting attachedmode configuration 204 c may be used to share content from theelectronic book viewer 102 with theelectronic book viewer 202. In the illustrated example, the removablyattachable display panel 106 b is configured to communicate with processing logic in the binding 208 when in the visiting attachedmode configuration 204 c. In this manner, the removablyattachable display panel 106 b may transfer content and/or content protection policies to the binding 208 and/or receive content and/or content protection policies from the binding 208. - In some example implementations, the removably
attachable display panel 106 b may be configured to present content in the different mode configurations 204 a-c based on content protection policies. For example, a content protection policy may specify different rules, provisions, or restrictions associated with the different modes 204 a-c. For example, one rule of a content protection policy may specify that corresponding content may be displayed so long as a removably attachable display panel (e.g., the removablyattachable display panel 106 b) presenting the content is attached to a “home” electronic book viewer (e.g., the electronic book viewer 102), while a second rule of the same content protection policy may specify that the displayed content (or a portion of the displayed content) must no longer be displayed on the removably attachable display panel or deleted from the removably attachable display panel when it is operating in thetablet mode 204 b. - Other content protection policies may specify that corresponding content may be displayed so long as a removably attachable display panel presenting the content is not attached to a ‘visited’ electronic book viewer (e.g., the electronic book viewer 202), and thus, the content may be presented while the display panel is attached to a “home” electronic book viewer (according to a first rule of a content protection policy) or while operating in a detached or tablet mode (e.g., the
tablet mode configuration 204 b) (according to a second rule of a content protection policy). In such example implementations, a third rule of a content protection policy specifies that the displayed content must no longer be displayed or must be deleted from the removably attachable display panel when it is operating in the visiting attachedmode 204 c. - Some content protection policies may specify that corresponding content may be presented on a detached display panel (e.g., in the
tablet mode configuration 204 b) until the expiration of a specified duration following the detachment of the display panel. Similarly, some content protection policies may specify that corresponding content may be presented on a display panel until the expiration of a specified duration following the attachment of the display panel to a ‘visited’ electronic book viewer. -
FIG. 3 depicts the binding 206 and the removablyattachable display panel 106 b of theelectronic book viewer 102 ofFIGS. 1 and 2 . In the illustrated example, the removablyattachable display panel 106 b is shown detached from the binding 206 and includes an electro-mechanical connector 302 for mechanically and communicatively attaching and securing the removablyattachable display panel 106 b to the binding 206. As shown inFIG. 3 , thebinding element 206 includes abinding processor system 304 that provides the binding element with communication, content storage, and content processing capabilities. The bindingprocessor system 304 may be configured to communicate with themobile device 104 via thewireless connection 108 ofFIG. 1 and communicate with each of the removably attachable display panels 106 a-c in a wireless fashion or through a physical connection (e.g., through the electro-mechanical connector 302). The binding 206 is provided with abattery 306 to power the bindingprocessor system 304. In the illustrated example, thebattery 306 is rechargeable by connecting the binding 206 with an external power source (e.g., an alternating current (AC) or direct current (DC) power source). - As also shown in
FIG. 3 , the removablyattachable display panel 106 b is provided with adisplay panel subsystem 308. Thedisplay panel subsystem 308 may be similar to thebinding processor system 304 or may be provided with relatively less or more processing, communication, and/or storage capabilities than thebinding processor system 304. The removablyattachable display panel 106 b is also provided with abattery 310 to power thedisplay panel subsystem 308. In the illustrated example ofFIG. 3 , thebattery 310 may be rechargeable and charged by thebattery 306 or an external power source when the removablyattachable display panel 106 b is attached to the binding 206. An example apparatus that may be used to implement thebinding processor system 304 and/or thedisplay panel subsystem 308 is described below in connection withFIG. 9 . -
FIG. 4 depicts a plan view of the example binding 206 and the removablyattachable display panel 106 b ofFIGS. 2 and 3 in an interconnected configuration. As shown, the binding 206 is provided with abinding connector 402 to receive the electro-mechanical connector 302 to make mechanical and electrical contact between the removablyattachable display panel 106 b and the binding 206. Fastening the electro-mechanical connector 302 to thebinding connector 402 causes engagement betweenelectrical contacts 404 of the electro-mechanical connector 302 and thebinding connector 402. In the illustrated example, theelectrical contacts 404 enable communications between the binding 206 and the removablyattachable display panel 106 b and power transfer from the binding 206 to the removablyattachable display panel 106 b. In other example implementations, optical contacts may be employed instead of theelectrical contacts 404 and/or theelectrical contacts 404 may be used in combination with optical contacts. - Although
FIGS. 3 and 4 depict the binding 206 as a cylindrical structure, the binding 206 may alternatively be implemented using other structural configurations. In addition, attachment elements for mechanically and communicatively fastening or attaching the removablyattachable display panel 106 b to the binding 206 may be implemented using fastening or connection structures other than the electro-mechanical connector 302 and thebinding connector 402 depicted inFIGS. 3 and 4 . In addition, in some example implementations, the bindingprocessor system 304 and thedisplay panel subsystem 308 may communicate with one another via wireless communications such that the removablyattachable display panel 106 b may communicate with the binding 206 when in an attached mode (e.g., the home attachedmode configuration 204 a ofFIG. 2 ) or a detached mode (e.g., thetablet mode configuration 204 b ofFIG. 2 ). -
FIG. 5 depicts a plan view of the exampleelectronic book viewer 102 ofFIGS. 1 and 2 . In the illustrated example ofFIG. 5 , each of the removably attachable display panels 106 a-c is implemented as a double-sided display panel having opposing displays. Opposing displays of thedisplay panel 106 b are indicated byreference numerals attachable display panel 106 b. In this manner, when a user turns the removably attachable display panels 106 a-c in a page turning fashion, a sequentially next page in an electronic publication or document can be displayed on a display (e.g., the display 504) opposing the previously viewed display (e.g., the display 502) to simulate a paper-based reading experience. - The
displays displays displays 502 and 504) to enable user input and control of theelectronic book viewer 102. Additionally or alternatively, the removably attachable display panels 106 a-c and/or the binding 206 may be provided with one or more user interface buttons or keys (not shown) to enable user-input and control of theelectronic book viewer 102. - In the illustrated example of
FIG. 5 , the removably attachable display panels 106 a-c are shown in an infinite rotation configuration relative to the binding 206. That is, each of the removably attachable display panels 106 a-c is configured to rotate an infinite number of times about the binding 206. Such an infinite rotation configuration may be advantageously used to simulate a reading experience similar to that of traditional paper-based books. For example, the binding 206 may be configured to sense or detect when each of the display panels 106 a-c is turned in a page turning manner in, for example, a direction generally indicated byarrows 506. Upon sensing a page turn, the binding 206 may cause the visible displays (e.g., thedisplays 502 and 504) of the display panels 106 a-c to display sequentially next pages of an electronic publication or document. In this manner, users may progress or move through a multi-page publication or document by turning the display panels 106 a-c about the binding 206. The infinite rotation capabilities of the display panels 106 a-c about the binding 206 provide an infinite number of page turns and, thus, theelectronic book viewer 102 may be used to present multi-page publications or documents having any number of pages. - In some example implementations, to sense or detect page turns based on turning of the display panels 106 a-c, the binding 206 may be provided with sensors (e.g., rotary encoders or magnetic sensors). Additionally or alternatively, the display panels 106 a-c may be provided with sensors to sense movement (e.g., accelerometers) and/or sensors to sense placement relative to one another. In some example implementations, the display panels 106 a-c may be provided with magnets and opposing reed switches to detect the positioning of the display panels 106 a-c adjacent one another and to detect when the display panels 106 a-c are moved away from one another. In some example implementations, the display panels 106 a-c may communicate or send turn page messages to the binding 206. The turn page messages may also include the direction of that page turn so that the binding 206 can send next or previous page(s) content to the display panels 106 a-c to present to a user as if the user were turning a page of a traditional paper-based book.
- Turning now to
FIG. 6 , in some example implementations, the removably attachable display panels 106 a-c of theelectronic book viewer 102 ofFIGS. 1 , 2, and 5 may be configured to be arranged in vertical and/or horizontal paneling configurations. In such configurations, the display panels 106 a-c form a large continuous display and content may be presented by extending the rendered content across two or more displays of the removably attachable display panels 106 a-c. The extended content may be displayed along a horizontal plane or a vertical plane. In the illustrated example, the display panels 106 a-c may be provided with inter-connectable inter-panel communication interfaces 602 or connectors to enable mechanically fastening the display panels 106 a-c to one another and to provide inter-panel communications to send content and content protection policies to the display panels 106 a-c from the binding 206. -
FIG. 7 depicts an example configuration for creating, storing, and accessing content protection policies associated with content presentable on the exampleelectronic book viewer 102 ofFIGS. 1 , 2 and 5. In the illustrated example, the remote content protectionpolicy data store 122 of the serviceprovider content server 114 is shown as storing a credential data structure 702 (e.g., a credential database or table) and a content protection policy data structure 704 (e.g., content protection policy database or table). Thecredential data structure 702 stores credentials that may be used to verify content access permissions for different users and/or devices (e.g., themobile device 104 and/or the electronic book viewer 102). The content protectionpolicy data structure 704 stores access control permissions to control access to content for different users and/or devices. Data structures similar or identical to thecredential data structure 702 and the content protectionpolicy data structure 704 may also be stored in the local content protectionpolicy data store 112 and/or the remote content protectionpolicy data store 126 ofFIG. 1 . In addition, thedata structures data structures - In the illustrated example of
FIG. 7 , thecredential data structure 702 includes an identifier (ID)column 706 and a credential column 708. In example implementations in which content protection and access control is implemented based on device identifiers, theID column 706 may store unique identifiers (e.g., electronic serial numbers, media access control (MAC) identifiers, etc.) of electronic book viewers (e.g., the electronic book viewer 102) and/or mobile communication devices (e.g., the mobile device 104). In example implementations in which content protection and access control is implemented based on users, theID column 706 may store user identification information (e.g., a subscriber ID, a name, etc.). - The credential column 708 stores credential information indicating the type of information that must be provided to confirm the identity of a device (e.g., the
electronic book viewer 102 or the mobile device 104) or the identity of a user. Such credential information may be in the form of a username/password combination or other device-generated or user-provided secret information. In some example implementations, the credential information may simply be an identifier stored in a corresponding entry of theID column 706 indicating that an electronic book viewer or mobile communication device need only provide the ID stored in theID column 706 to confirm the identity of the electronic book viewer or mobile communication device. - In example implementations in which content protection and access control is implemented based on user identities, the credential column 708 may store biometric or other user-recognition information user-identification information such as fingerprint minutiae data, facial recognition data, voice recognition data, gesture data (e.g., hand, finger, or stylus movement patterns across a touch panel interface), etc. For example, the
electronic book viewer 102 may be provided withcredential sensors 710 as shown inFIG. 7 . Thecredential sensors 710 may be digital camera imagers, fingerprint sensors, microphones, etc. Thecredential sensors 710 may be provided only on the display panels 106 a-c, only on the binding 206, or on the display panels 106 a-c and the binding 206. In the case of digital camera imagers, thecredential sensors 710 may acquire a snapshot of a person actively viewing (or exposed to) a display panel (e.g., one of the display panels 106 a-c) and use the snapshot information to determine the identity of the person based on the credential information in the credential column 708. In the case of fingerprint sensors, thecredential sensors 710 may acquire fingerprint information for fingerprint matching purposes. In the case of microphones, thecredential sensors 710 may collect speech utterances for purposes of performing speaker recognition to identify persons. Enrollment of such biometric or user-recognition information may be performed via theelectronic book viewer 102, themobile device 104, or a home oroffice computer 712 and communicated to the serviceprovider content server 114 for storing in thecredential data structure 702. - In the illustrated example of
FIG. 7 , the content protectionpolicy data structure 704 includes anID column 714, apermissions column 716, and acontent ID column 718. TheID column 714 is similar to theID column 706 and can store user IDs for instances in which content protection and access control is implemented based on user identities or device IDs for instances in which content protection and access control is implemented based on device identities. Thepermissions column 716 stores rules defining the types of protections or access controls to be enforced for corresponding content, and thecontent ID column 718 stores identifiers of content corresponding to the rules in thepermissions column 716. Thus, in the illustrated example ofFIG. 7 , particular content identified in thecontent ID column 718 is associated with corresponding rules stored in thepermissions column 716 to control access by a device or user identified inID column 714, and the identity of the user or device identified in theID column 714 is validated, verified, or confirmed based on credential information specified in a corresponding entry in the credential column 708 of thecredential data structure 702. - In some example implementations, credential requirements in the credential column 708 and permissions in the content protection
policy data structure 704 may be user-created or user-specified via, for example, theelectronic book viewer 102, themobile device 104, and/or thecomputer 712. For example, credential information may identify family members of a household, extended family members, friends, co-workers, employees, etc. In this manner, end users may create content protection and access control permissions for family members or friends in a social environment or employees/co-workers in a professional work environment. - In the illustrated examples described herein, the protection policies in the content protection
policy data structure 704 may be enforced by electronic book viewers (e.g., the electronic book viewer 102) and/or processor systems in communication with the electronic book viewers such as, for example, themobile device 104. When enforced by theelectronic book viewer 102, the content protection policies may be enforced using thebinding processor system 304 and/or display panel sub-systems of the display panels 106 a-c (e.g., thedisplay panel sub-system 308 of thedisplay panel 106 b ofFIG. 3 ). - The protection policies may be enforced to protect or control access to content when such content is handled or shared using the attachable and detachable capabilities of the removably attachable display panels 106 a-c described above in connection with
FIG. 2 . For example, different protection policies may define different access control protections based on the home attachedmode configuration 204 a, thetablet mode configuration 204 b, and the visiting attachedmode configuration 204 c ofFIG. 2 . - Additionally or alternatively, protection policies in the content protection
policy data structure 704 may be enforced when content is communicatively transmitted between electronic book viewers and/or processor systems in communication with the electronic book viewers such as, for example, themobile device 104. For example, as shown inFIG. 8 , theelectronic book viewer 102 may be configured to analyze and enforce protection policies in the content protectionpolicy data structure 704 and wirelessly sendshareable content 802 to theelectronic book viewer 202 and/or to anothermobile device 804. Similarly, themobile device 104 may additionally or alternatively analyze and enforce protection policies in the content protectionpolicy data structure 704 and wirelessly sendshareable content 806 to theelectronic book viewer 202 and/or to the mobile device 804 (or other processor system in communication with and hosting content for the electronic book viewer 202). - Briefly referring back to
FIG. 7 , the content identified in thecontent ID column 718 may identify user-authored content, which may include notes, comments, or markups related to another authored work. In this manner, user-authored content may be protected using content protection and access control permissions different from those enforced for underlying original content (e.g., commercially available published works, medical records, legal documents, etc.). For example, turning toFIG. 9 , the removablyattachable display panel 106 b hasoriginal content 902 displayed thereon and user-authored content 904 (e.g., user notes) displayed in overlaid fashion on theoriginal content 902. In the illustrated example, theoriginal content 902 and the user-authoredcontent 904 may be represented by two separate identifiers in theID column 714 ofFIG. 7 and are associated with separate content protection policies. For example, a content protection policy for theoriginal content 902 may indicate that theoriginal content 902 is freely distributable or shareable with any person or device, while a content protection policy (e.g., specified by a user) may indicate that the user-authoredcontent 904 can only be displayed on a particular device or devices (e.g., identified by a particular device ID) or can only be displayed to a particular person or persons (e.g., identified based on some biometric or user identifier information specified in the credential column 708 ofFIG. 7 ). - To enforce respective protection policies of the
original content 902 and user-authoredcontent 904 during a content transfer or sharing process between two or more electronic book viewers, an electronic book viewer (e.g., the electronic book viewer 102) or an associated mobile communication device (e.g., the mobile device 104) may transfer the shareable content (e.g., the original content 902), while not sharing non-shareable content (e.g., the user-authored content 904). For example, as shown inFIG. 9 , theoriginal content 902 is transferred to adisplay panel 906 of another electronic book viewer during a shareablecontent transfer session 908, while the user-authoredcontent 904 is omitted from the transfer. Similarly, if the removablyattachable display panel 106 b is removed from the binding 206 of theelectronic book viewer 102 and attached to another binding such as the binding 208 ofFIG. 2 , the display panel subsystem 308 (FIG. 3 ) may enforce the content protection policy of the user-authoredcontent 904 to cease the displaying thereof based on, for example, being detached (e.g., in thetablet mode configuration 204 b), being attached to another binding (e.g., in the visitingmode configuration 204 c), or being viewed by a non-authorized person. - Although
FIG. 9 shows the enforcement of a restrictive access control to only the user-authored content 204 in connection with thecontent transfer session 908, in other example implementations, theelectronic book viewer 102 and/or themobile device 104 may similarly protect access to original content or other content by first determining the types of protection or access control specified for the content prior to responding to a transfer request (e.g., a request to perform the shareable content transfer session 908). If a protection policy specifies that the content requested for transfer cannot be transferred, theelectronic book viewer 102 and/or themobile device 104 may display an explanation of such to a user. - In some example implementations, when the
electronic book viewer 102 requests theoriginal content 902 and user-authoredcontent 904 from themobile device 104, themobile device 104 may deny the request for both theoriginal content 902 and the user-authoredcontent 904 if thecontent electronic book viewer 102. Alternatively, themobile device 104 may deny the request only for the user-authoredcontent 904 but not theoriginal content 902 if themobile device 104 determines that theoriginal content 902 is not protected from display on theelectronic book viewer 102, while the user-authoredcontent 904 is protected from display on theelectronic book viewer 102. - In addition, although
FIG. 9 shows the user-authoredcontent 904 as being non-shareable content, in other example implementations, non-shareable content may be content that is part of theoriginal content 902. For example, if theoriginal content 902 is a person's medical record, the person may specify that a personal identifier (e.g., a social security number) or certain medical history events in the original content not be transferred even though the remainder of theoriginal content 902 is designated as transferable. In such instances, non-transferable information in theoriginal content 902 may appear as redacted or as blank when theoriginal content 902 is rendered on thedisplay panel 906 after the shareablecontent transfer session 908. In other example implementations associated with, for example, shareable electronic books or publications, a person may indicate to only share a single page, column, paragraph, story, or any other desired portion without sharing an entire electronic book or publication. -
FIG. 10 depicts anexample apparatus 1000 that may be used to implement thebinding processor system 304 and/or thedisplay panel subsystem 308 ofFIG. 3 to implement theelectronic book viewer 102 ofFIGS. 1 , 2, 5, and 7. In some example implementations, some portions of theexample apparatus 1000 may also be implemented in themobile device 104. In the illustrated example, theapparatus 1000 includes aprocessor 1002 that may be used to control the overall operation of theapparatus 1000. Theprocessor 1002 may be implemented using a controller, a general purpose processor, a digital signal processor, or any combination thereof. - In the illustrated example of
FIG. 10 , theapparatus 1000 also includes aprotection policy enforcer 1004, acredential verifier 1006, anattachment status detector 1008, and apanel motion analyzer 1010. Theprotection policy enforcer 1004 may be used to analyze and enforce content protection policies (e.g., protection policies stored in the content protectionpolicy data stores FIG. 1 and the content protectionpolicy data structure 704 ofFIG. 7 ) to protect or control access to content (e.g., content stored in thecontent data stores FIG. 1 ). Thecredential verifier 1006 may be used to verify or validate credentials required by the credential requirements stored in thecredential data structure 702 ofFIG. 7 to confirm identities of users and/or devices. In some example implementations, theprotection policy enforcer 1004 and thecredential verifier 1006 may additionally or alternatively be implemented in a host device such as themobile device 104. In this manner, themobile device 104 can operate as an authorizing device to control/authorize access to content based on content protection policies and credentials (e.g., user and/or device credentials). - The
attachment status detector 1008 may be used to detect attached/detached operating modes (e.g., the home attachedmode configuration 204 a, thetablet mode configuration 204 b, and the visiting attachedmode configuration 204 c ofFIG. 2 ) of the removably attachable display panels 106 a-c. Thepanel motion analyzer 1010 may be used to detect page turns of the removably attachable display panels 106 a-c to trigger the presentation of subsequent page content of an electronic book or document in response to a forward page turn event or trigger the presentation of previous page content of an electronic book or document in response to a backward page turn event. - The
protection policy enforcer 1004, thecredential verifier 1006, theattachment status detector 1008, and thepanel motion analyzer 1010 may be implemented using any desired combination of hardware, firmware, and/or software. For example, one or more integrated circuits, discrete semiconductor components, and/or passive electronic components may be used. Thus, for example, theprotection policy enforcer 1004, thecredential verifier 1006, theattachment status detector 1008, and thepanel motion analyzer 1010, or parts thereof, could be implemented using one or more circuit(s), programmable processor(s), application specific integrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)), field programmable logic device(s) (FPLD(s)), etc. Theprotection policy enforcer 1004, thecredential verifier 1006, theattachment status detector 1008, and thepanel motion analyzer 1010, or parts thereof, may be implemented using instructions, code, and/or other software and/or firmware, etc. stored on a machine accessible medium and executable by, for example, a processor (e.g., the example processor 1002). When any of the appended claims are read to cover a purely software implementation, at least one of theprotection policy enforcer 1004, thecredential verifier 1006, theattachment status detector 1008, or thepanel motion analyzer 1010 is hereby expressly defined to include a tangible medium such as a solid state memory, a magnetic memory, a DVD, a CD, etc. - The
apparatus 1000 is provided with one or more communication subsystem(s) 1012 to enable sending and receiving content and content protection policies. The communication subsystem(s) 1012 may be wired, wireless, or a combination thereof. For example, the bindingprocessor subsystem 304 and thedisplay panel subsystem 308 may be provided with at least one wired communication subsystem (e.g., a serial interface) to enable exchanging information between the binding 206 and the removably attachable display panels 106 a-c. Alternatively, communications between the binding 206 and the removably attachable display panels 106 a-c may be performed via wireless communications. The bindingprocessor subsystem 304 and thedisplay panel subsystem 308 may be provided with wireless communication subsystems to communicate with the mobile device 104 (FIGS. 1 , 7, and 8). Example wireless communication technologies that may be employed to implement the one or more communication subsystem(s) 1012 include, for example, IEEE® 802.11 radio technology, BLUETOOTH® radio technology, ZIGBEE® radio technology, wireless USB radio technology, and ultra-wideband (UWB) radio technology. - In the illustrated example, the
apparatus 1000 is also provided with asystem memory 1014 and amass storage memory 1016. Thesystem memory 1014 may be implemented using a volatile memory such as a random access memory (RAM) and used to store immediately available computer readable instructions and data (e.g., content presentable via theelectronic book viewer 102, content protection policies, etc.) to control the operation of theapparatus 1000. Themass storage memory 1016 may be implemented using a non-volatile memory such as a flash memory and may be used as long-term storage of computer readable instructions and/or data (e.g., content presentable via theelectronic book viewer 102, content protection policies, etc.). - To enable a user to use and interact with or via the
electronic book viewer 102, theapparatus 1000 is provided with adisplay interface 1018 and auser input interface 1020. Thedisplay interface 1018 can be an LCD display interface, an e-paper display interface, an organic light emitting diode (OLED) interface, etc. Theuser input interface 1020 could be an alphanumeric keyboard and/or telephone-type keypad, a multi-direction actuator or roller wheel with dynamic button pressing capability, a touch panel, individual keys/buttons, etc. In the illustrated example, theapparatus 1000 is a battery-powered device and is, thus, provided with abattery interface 1022 to interface with, for example, thebattery 306 and/or thebattery 310 ofFIG. 3 . -
FIG. 11 depicts a block diagram of an example implementation of a processor system that may be used to implement themobile device 104. In the illustrated example, themobile device 104 is a two-way communication device with advanced data communication capabilities including the capability to communicate with other mobile devices or computer systems through a network of transceiver stations. Themobile device 104 may also have the capability to allow voice communication. Depending on the functionality provided by the mobile device, it may be referred to as a data messaging device, a two-way pager, a cellular telephone with data messaging capabilities, a smart phone, a wireless Internet appliance, or a data communication device (with or without telephony capabilities). To aid the reader in understanding the structure of themobile device 104 and how it communicates with other devices and host systems,FIG. 11 will now be described in detail. - Referring first to
FIG. 11 , themobile device 104 includes a number of components such as amain processor 1102 that controls the overall operation of themobile device 104. Communication functions, including data and voice communications, are performed through acommunication subsystem 1104. Thecommunication subsystem 1104 receives messages from and sends messages to awireless network 1105. In the illustrated example of themobile device 104, thecommunication subsystem 1104 is configured in accordance with the Global System for Mobile Communication (GSM) and General Packet Radio Services (GPRS) standards. The GSM/GPRS wireless network is used worldwide and it is expected that these standards will be superseded eventually by Enhanced Data GSM Environment (EDGE) and Universal Mobile Telecommunications Service (UMTS). New standards are still being defined, but it is believed that they will have similarities to the network behavior described herein, and it will also be understood by persons skilled in the art that the example implementations described herein are intended to use any other suitable standards that are developed in the future. The wireless link connecting thecommunication subsystem 1104 with thewireless network 1105 represents one or more different Radio Frequency (RF) channels, operating according to defined protocols specified for GSM/GPRS communications. With newer network protocols, these channels are capable of supporting both circuit switched voice communications and packet switched data communications. - Although the
wireless network 1105 associated withmobile device 104 is a GSM/GPRS wireless network in one exemplary implementation, other wireless networks may also be associated with themobile device 104 in variant implementations. The different types of wireless networks that may be employed include, for example, data-centric wireless networks, voice-centric wireless networks, and dual-mode networks that can support both voice and data communications over the same physical base stations. Combined dual-mode networks include, but are not limited to, Code Division Multiple Access (CDMA) or CDMA2000 networks, GSM/GPRS networks (as mentioned above), and future third-generation (3G) networks like EDGE and UMTS. Some other examples of data-centric networks include WiFi 802.11, MOBITEX® and DATATAC® network communication systems. Examples of other voice-centric data networks include Personal Communication Systems (PCS) networks like GSM and Time Division Multiple Access (TDMA) systems. - The
main processor 1102 also interacts with additional subsystems such as a Random Access Memory (RAM) 1106, a persistent memory 1108 (e.g., a non-volatile memory), adisplay 1110, an auxiliary input/output (I/O)subsystem 1112, adata port 1114, akeyboard 1116, aspeaker 1118, amicrophone 1120, short-range communications 1122, andother device subsystems 1124. - Some of the subsystems of the
mobile device 104 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions. By way of example, thedisplay 1110 and thekeyboard 1116 may be used for both communication-related functions, such as entering a text message for transmission over thenetwork 1105, and device-resident functions such as a calculator or task list. - The
mobile device 104 can send and receive communication signals over thewireless network 1105 after required network registration or activation procedures have been completed. Network access is associated with a subscriber or user of themobile device 104. To identify a subscriber, themobile device 104 requires a SIM/RUIM card 1126 (i.e. Subscriber Identity Module or a Removable User Identity Module) to be inserted into a SIM/RUIM interface 1128 in order to communicate with a network. The SIM card orRUIM 1126 is one type of a conventional “smart card” that can be used to identify a subscriber of themobile device 104 and to personalize themobile device 104, among other things. Without theSIM card 1126, themobile device 104 is not fully operational for communication with thewireless network 1105. By inserting the SIM card/RUIM 1126 into the SIM/RUIM interface 1128, a subscriber can access all subscribed services. Services may include: web browsing and messaging such as e-mail, voice mail, Short Message Service (SMS), and Multimedia Messaging Services (MMS). More advanced services may include: point of sale, field service and sales force automation, content presentation via the electronic book viewer 102 (FIGS. 1 , 2, 5, 7, and 8). The SIM card/RUIM 1126 includes a processor and memory for storing information. Once the SIM card/RUIM 1126 is inserted into the SIM/RUIM interface 1128, it is coupled to themain processor 1102. In order to identify the subscriber, the SIM card/RUIM 1126 can include some user parameters such as an International Mobile Subscriber Identity (IMSI). An advantage of using the SIM card/RUIM 1126 is that a subscriber is not necessarily bound by any single physical mobile device. The SIM card/RUIM 1126 may store additional subscriber information for a mobile device as well, including datebook (or calendar) information and recent call information. Alternatively, user identification information can also be programmed into thepersistent memory 1108. - The
mobile device 104 is a battery-powered device and includes abattery interface 1132 for receiving one or morerechargeable batteries 1130. In at least some embodiments, thebattery 1130 can be a smart battery with an embedded microprocessor. Thebattery interface 1132 is coupled to a regulator (not shown), which assists thebattery 1130 in providing power V+ to themobile device 104. Although current technology makes use of a battery, future technologies such as micro fuel cells may provide the power to themobile device 104. - The
mobile device 104 also includes anoperating system 1134 andsoftware components 1136 to 1146 which are described in more detail below. Theoperating system 1134 and thesoftware components 1136 to 1146 that are executed by themain processor 1102 are typically stored in a persistent store such as thepersistent memory 1108, which may alternatively be a read-only memory (ROM) or similar storage element (not shown). Those skilled in the art will appreciate that portions of theoperating system 1134 and thesoftware components 1136 to 1146, such as specific device applications, or parts thereof, may be temporarily loaded into a volatile store such as theRAM 1106. Other software components can also be included, as is well known to those skilled in the art. - The subset of
software applications 1136 that control basic device operations, including data and voice communication applications, will normally be installed on themobile device 104 during its manufacture. Other software applications include amessage application 1138 that can be any suitable software program that allows a user of themobile device 104 to send and receive electronic messages. Various alternatives exist for themessage application 1138 as is well known to those skilled in the art. Messages that have been sent or received by the user are typically stored in thepersistent memory 1108 of themobile device 104 or some other suitable storage element in themobile device 104. In at least some embodiments, some of the sent and received messages may be stored remotely from themobile device 104 such as in a data store of an associated host system that themobile device 104 communicates with. - The software applications can further include a
device state module 1140, a Personal Information Manager (PIM) 1142, and other suitable modules (not shown). Thedevice state module 1140 provides persistence (i.e., thedevice state module 1140 ensures that important device data is stored in persistent memory, such as thepersistent memory 1108, so that the data is not lost when themobile device 104 is turned off or loses power). - The
PIM 1142 includes functionality for organizing and managing data items of interest to the user, such as, but not limited to, e-mail, contacts, calendar events, voice mails, appointments, and task items. A PIM application has the ability to send and receive data items via thewireless network 1105. PIM data items may be seamlessly integrated, synchronized, and updated via thewireless network 1105 with the mobile device subscriber's corresponding data items stored and/or associated with a host computer system. This functionality creates a mirrored host computer on themobile device 104 with respect to such items. This can be particularly advantageous when the host computer system is the mobile device subscriber's office computer system. - The
mobile device 104 also includes aconnect module 1144, and anIT policy module 1146. Theconnect module 1144 implements the communication protocols that are required for themobile device 104 to communicate with the wireless infrastructure and any host system, such as an enterprise system, that themobile device 104 is authorized to interface with. - The
connect module 1144 includes a set of APIs that can be integrated with themobile device 104 to allow themobile device 104 to use any number of services associated with the enterprise system. Theconnect module 1144 allows themobile device 104 to establish an end-to-end secure, authenticated communication pipe with the host system. A subset of applications for which access is provided by theconnect module 1144 can be used to pass IT policy commands from the host system (e.g., from the IT policy server 128 (FIG. 1 ) of a host system) to themobile device 104. This can be done in a wireless or wired manner. These instructions can then be passed to theIT policy module 1146 to modify the configuration of themobile device 104 and/or theelectronic book viewer 102. Alternatively, in some cases, the IT policy update can also be done over a wired connection. - The
IT policy module 1146 receives IT policy data that encodes the IT policy. TheIT policy module 1146 then ensures that the IT policy data is authenticated by themobile device 104. The IT policy data can then be stored in theflash memory 1106 in its native form. After the IT policy data is stored, a global notification can be sent by theIT policy module 1146 to all of the applications residing on themobile device 104. Applications for which the IT policy may be applicable then respond by reading the IT policy data to look for IT policy rules that are applicable. - The
IT policy module 1146 can include a parser (not shown), which can be used by the applications to read the IT policy rules. In some cases, another module or application can provide the parser. Grouped IT policy rules, described in more detail below, are retrieved as byte streams, which are then sent (recursively, in a sense) into the parser to determine the values of each IT policy rule defined within the grouped IT policy rule. In at least some embodiments, theIT policy module 1146 can determine which applications (e.g., a media content application for communicating with theelectronic book viewer 102 ofFIGS. 1 , 2, 5, 7, and 8) are affected by the IT policy data and send a notification to only those applications. In either of these cases, for applications that aren't running at the time of the notification, the applications can call the parser or theIT policy module 1146 when they are executed to determine if there are any relevant IT policy rules in the newly received IT policy data. - All applications that support rules in the IT Policy are coded to know the type of data to expect. For example, the value that is set for the “WEP User Name” IT policy rule is known to be a string; therefore the value in the IT policy data that corresponds to this rule is interpreted as a string. As another example, the setting for the “Set Maximum Password Attempts” IT policy rule is known to be an integer, and therefore the value in the IT policy data that corresponds to this rule is interpreted as such.
- After the IT policy rules have been applied to the applicable applications or configuration files, the
IT policy module 1146 sends an acknowledgement back to the host system to indicate that the IT policy data was received and successfully applied. - Other types of software applications can also be installed on the
mobile device 104. These software applications can be third party applications, which are added after the manufacture of themobile device 104. Examples of third party applications include games, calculators, utilities, etc. - The additional applications can be loaded onto the
mobile device 104 through at least one of thewireless network 1105, the auxiliary I/O subsystem 1112, thedata port 1114, the short-range communications subsystem 1122, or any othersuitable device subsystem 1124. This flexibility in application installation increases the functionality of themobile device 104 and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using themobile device 104. - The
data port 1114 enables a subscriber to set preferences through an external device or software application and extends the capabilities of themobile device 104 by providing for information or software downloads to themobile device 104 other than through a wireless communication network. The alternate download path may, for example, be used to load an encryption key onto themobile device 104 through a direct and thus reliable and trusted connection to provide secure device communication. - The
data port 1114 can be any suitable port that enables data communication between themobile device 104 and another computing device. Thedata port 1114 can be a serial or a parallel port. In some instances, thedata port 1114 can be a USB port that includes data lines for data transfer and a supply line that can provide a charging current to charge thebattery 1130 of themobile device 104. - The short-
range communications subsystem 1122 provides for communication between themobile device 104 and different systems or devices, without the use of thewireless network 1105. For example, thesubsystem 1122 may include an infrared device and associated circuits and components for short-range communication. Examples of short-range communication standards include standards developed by the Infrared Data Association (IrDA), Bluetooth, and the 802.11 family of standards developed by IEEE. - In use, a received signal such as a text message, an e-mail message, web page download, media content for presenting via the electronic book viewer 102 (
FIGS. 1 , 2, 3, 5, 7, and 8) will be processed by thecommunication subsystem 1104 and input to themain processor 1102. Themain processor 1102 will then process the received signal for output to the display 1110 (or a display of the electronic book viewer 102) or alternatively to the auxiliary I/O subsystem 1112. A subscriber may also compose data items, such as e-mail messages, for example, using thekeyboard 1116 in conjunction with thedisplay 1110 and possibly the auxiliary I/O subsystem 1112. Theauxiliary subsystem 1112 may include devices such as: a touch screen, mouse, track ball, infrared fingerprint detector, or a roller wheel with dynamic button pressing capability. Thekeyboard 1116 is preferably an alphanumeric keyboard and/or telephone-type keypad. However, other types of keyboards may also be used. A composed item may be transmitted over thewireless network 1105 through thecommunication subsystem 1104. - For voice communications, the overall operation of the
mobile device 104 is substantially similar, except that the received signals are output to thespeaker 1118, and signals for transmission are generated by themicrophone 1120. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, can also be implemented on themobile device 104. Although voice or audio signal output is accomplished primarily through thespeaker 1118, thedisplay 1110 can also be used to provide additional information such as the identity of a calling party, duration of a voice call, or other voice call related information. -
FIGS. 12 and 13 depict example flow diagrams representative of processes that may be implemented using, for example, computer readable instructions that may be used to display content on the electronic book viewer in accordance with content protection policies and to transfer content between electronic book readers and/or host devices in accordance with content protection policies. The example processes ofFIGS. 12 and 13 may be performed using one or more processors, controllers, and/or any other suitable processing devices. For example, the example processes ofFIGS. 12 and 13 may be implemented using coded instructions (e.g., computer readable instructions) stored on one or more tangible computer readable media such as flash memory, read-only memory (ROM), and/or random-access memory (RAM). As used herein, the term tangible computer readable medium is expressly defined to include any type of computer readable storage and to exclude propagating signals. Additionally or alternatively, the example processes ofFIGS. 12 and 13 may be implemented using coded instructions (e.g., computer readable instructions) stored on one or more non-transitory computer readable media such as flash memory, read-only memory (ROM), random-access memory (RAM), cache, or any other storage media in which information is stored for any duration (e.g., for extended time periods, permanently, brief instances, for temporarily buffering, and/or for caching of the information). As used herein, the term non-transitory computer readable medium is expressly defined to include any type of computer readable medium and to exclude propagating signals. - Alternatively, some or all of the example processes of
FIGS. 12 and 13 may be implemented using any combination(s) of application specific integrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)), field programmable logic device(s) (FPLD(s)), discrete logic, hardware, firmware, etc. Also, some or all of the example processes ofFIGS. 12 and 13 may be implemented manually or as any combination(s) of any of the foregoing techniques, for example, any combination of firmware, software, discrete logic and/or hardware. Further, although the example processes ofFIGS. 12 and 13 are described with reference to the flow diagrams ofFIGS. 12 and 13 , other methods of implementing the processes ofFIGS. 12 and 13 may be employed. For example, the order of execution of the blocks may be changed, and/or some of the blocks described may be changed, eliminated, sub-divided, or combined. Additionally, any or all of the example processes ofFIGS. 12 and 13 may be performed sequentially and/or in parallel by, for example, separate processing threads, processors, devices, discrete logic, circuits, etc. - Now turning to
FIG. 12 , the depicted flow diagram is representative of an example process that may be used to display content on the electronic book viewer in accordance with content protection policies. The example process is described below as being performed by theelectronic book viewer 102 as implemented using theapparatus 1000 ofFIG. 10 . However, the example process may alternatively be performed by themobile device 104 while in communication with theelectronic book viewer 102 and controlling operations of theelectronic book viewer 102. For example, themobile device 104 may communicate wirelessly with the binding 206 (FIG. 2 ) and/or with each of the removably attachable display panels 106 a-c to detect attachable/detachable status thereof and control/authorize presentation of content thereby. - Initially, the
electronic book viewer 102 receives content (block 1202) via, for example, thecommunication interface 1012 ofFIG. 10 . For example, theelectronic book viewer 102 may receive content from any of thecontent data stores FIG. 1 via themobile device 104. Theelectronic book viewer 102 stores the content locally in one or more of the display panels 106 a-c ofFIGS. 1 , 2, 5, and 6 (block 1204). For example, theelectronic book viewer 102 can store the content in thesystem memory 1014 or the mass memory 1016 (FIG. 10). Theelectronic book viewer 102 receives a corresponding content protection policy (block 1206) via, for example, thecommunication interface 1012. For example, theelectronic book viewer 102 may receive content from any of the content protectionpolicy data stores FIG. 1 via themobile device 104. Theelectronic book viewer 102 stores the content protection policy locally in one or more of the display panels 106 a-c having corresponding content stored therein (block 1208). For example, theelectronic book viewer 102 can store the content protection policy in thesystem memory 1014 or themass memory 1016. - The
electronic book viewer 102 then uses theprotection policy enforcer 1004 to determine whether the received content can be presented based on its corresponding content protection policy (block 1210). For example, theprotection policy enforcer 1004 may determine whether the content protection policy allows the content to be presented on theelectronic book viewer 102 based on, for example, a credential (e.g., a user ID, a device ID, etc.), an access control rule (e.g., date/time, duration, payment, etc.), or any other access control criteria. In some example implementations, the credential verifier 1006 (FIG. 10 ) may be invoked to verify the identity of a user and/or a device as discussed above and communicate a verification statement to theprotection policy enforcer 1004 for use in enforcing the received content protection policy. In some example implementations, content protection policies may specify that corresponding content may be presented only when an electronic book viewer is within communication range of a host device (e.g., the mobile device 104) and/or in communication with a service provider network of the host device. Some content protection policies may specify that a service policy from, for example, theIT policy server 128 ofFIG. 1 allows or authorizes the content to be displayed on the electronic book viewer 102 (e.g., the content is not protected from being displayed on the electronic book viewer 102). - In any case, if the
protection policy enforcer 1004 determines that the content may be presented (block 1210), theelectronic book viewer 102 presents the content via one or more of the removably attachable display panels 106 a-c (block 1212). - The attachment status detector 1008 (
FIG. 10 ) (in the binding 206 or in each of the display panels 106 a-c) determines whether a display panel attachment status has changed (block 1214) for any of the display panels 106 a-c. For example, the attachment status may be indicative of a display panel 106 a-c being in the home attachedmode configuration 204 a, thetablet mode configuration 204 b, or the visiting attachedmode configuration 204 c ofFIG. 2 . If the display panel attachment status has changed (block 1214), theattachment status detector 1008 identifies the attachment status of one of the display panels 106 a-c associated with the attachment status change (block 1216). Theprotection policy enforcer 1004 selects a content protection operation (e.g., a rule, provision, or restriction from the content protection policy received at block 1206) corresponding to the identified attachment status (block 1218) and enforces the content protection policy for the presented content based on the selected content protection operation (block 1220). For example, the content protection operation may indicate that the content should be removed immediately or after a specified duration in response to the attachment status change. Alternatively, the content protection operation may indicate that the content can remain displayed while the display panel 106 a-c is in the identified attachment status. - After enforcing the content protection policy (block 1220) or if the attachment status has not changed (block 1214) or if the content is not to be presented (block 1210), the electronic book viewer 102 (or the display panels 106 a-c) determines whether it should continue to wait for an attachment status change (or another attachment status change) (block 1224). If the
electronic book viewer 102 determines that it should continue to wait for an attachment status change (e.g., the content remains displayed) (block 1224) control returns to block 1210. Atblock 1210, theprotection policy enforcer 1004 can re-evaluate whether it should continue to present the content or present content that was not previously presentable. For example, theprotection policy enforcer 1004 may determine that content should no longer be presented when any criteria or rule associated with a corresponding protection policy is being violated (e.g., a duration has expired, a date/time has passed, theelectronic book viewer 102 is no longer within communication range of themobile device 104 and/or is no longer in communication with a service provider network, a user or device credential is no longer present or valid, etc.). - If the
electronic book viewer 102 determines that it should no longer wait for an attachment status change (block 1224) (e.g., content is no longer being displayed and/or theelectronic book viewer 102 has been powered off), the example process ofFIG. 12 is ended. - Now turning to
FIG. 13 , the depicted flow diagram is representative of an example process that may be used to transfer content between electronic book viewers and/or host devices (e.g., themobile devices FIG. 8 ) in accordance with content protection policies. Although the example process is described as being performed by theelectronic book reader 102 as implemented using theexample apparatus 1000 ofFIG. 10 , the example process may instead be performed by a host device such as themobile device 102 as described above in connection withFIG. 8 . Initially, theelectronic book reader 102 receives a content transfer request (block 1302). The content transfer request may request to transfer one or more content instances associated with the same or different content protection policies. Theprotection policy enforcer 1004 retrieves one or more corresponding content protection policies (block 1304) and determines whether any of the content requested for transfer is transferable (e.g., shareable) (block 1306). For example, the one or more retrieved content protection policies may indicate that some of the content requested for transfer is shareable with others (e.g., not protected from displaying on an electronic book viewer of a target recipient), while one or more of the content protection policies may indicate that some of the content is not shareable with anyone (e.g., protected from displaying on an electronic book viewer of a target recipient). For example, in the example ofFIG. 9 , theoriginal content 902 may be shareable, while the user-authoredcontent 904 may not be shareable. In some example implementations, only certain portions of theoriginal content 902 may be shareable while other portions are not and must be omitted from a content transfer (e.g., the shareablecontent transfer session 908 ofFIG. 9 ). In yet other example implementations, determining whether the requested content may be transferred involves confirming that a service policy from, for example, theIT policy server 128 ofFIG. 1 protects the content from being displayed on an electronic book viewer of a target recipient. - If there is at least some transferable content (block 1306), the
protection policy enforcer 1004 determines whether any of the content is non-transferable (i.e., not shareable). If there is any content that is non-transferable (block 1308), theelectronic book viewer 102 sends only the transferable content identified atblock 1306 to a target destination (e.g., to theelectronic book viewer 202 ofFIGS. 2 and 8 or to themobile device 804 ofFIG. 8 ) and omits the non-transferable content identified at block 1308 (block 1310). However, if theelectronic book viewer 102 determines that none of the content requested for transfer is non-transferable (block 1308), theelectronic book viewer 102 sends all of the selected content to the target destination (block 1312). Alternatively, if theelectronic book viewer 102 determines that none of the content requested for transfer is transferable (block 1306), theelectronic book viewer 102 denies the content transfer request (block 1314) by, for example, presenting a message via one of the removably attachable display panels 106 a-c. - After denying the content transfer request (block 1314) or after sending only the transferable content to the target destination (block 1310) or after sending all of the selected content to the target destination (block 1312), the example process of
FIG. 13 is ended. - Although certain methods, apparatus, and articles of manufacture have been described herein, the scope of coverage of this patent is not limited thereto. To the contrary, this patent covers all methods, apparatus, and articles of manufacture fairly falling within the scope of the appended claims either literally or under the doctrine of equivalents.
Claims (30)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/873,994 US8613061B2 (en) | 2010-09-01 | 2010-09-01 | Methods and apparatus to implement electronic book viewers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/873,994 US8613061B2 (en) | 2010-09-01 | 2010-09-01 | Methods and apparatus to implement electronic book viewers |
Publications (2)
Publication Number | Publication Date |
---|---|
US20120054822A1 true US20120054822A1 (en) | 2012-03-01 |
US8613061B2 US8613061B2 (en) | 2013-12-17 |
Family
ID=45698944
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/873,994 Active 2031-09-10 US8613061B2 (en) | 2010-09-01 | 2010-09-01 | Methods and apparatus to implement electronic book viewers |
Country Status (1)
Country | Link |
---|---|
US (1) | US8613061B2 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130021261A1 (en) * | 2011-07-18 | 2013-01-24 | Research In Motion Limited | Electronic device and method of controlling same |
US20130050164A1 (en) * | 2011-08-23 | 2013-02-28 | Nicholaus R. Rericha | Electronic device cases and covers having a reflective display, and methods thereof |
WO2013050928A3 (en) * | 2011-10-03 | 2013-05-30 | Nokia Corporation | An apparatus configured to have multiple user interfaces and method |
US20130227471A1 (en) * | 2012-02-24 | 2013-08-29 | Samsung Electronics Co., Ltd. | Method of providing information and mobile terminal thereof |
US20140244801A1 (en) * | 2013-02-28 | 2014-08-28 | Apple Inc. | Network-based distribution system supporting transfer of application products |
US20140347264A1 (en) * | 2013-05-22 | 2014-11-27 | Samsung Electronics Co., Ltd. | Device and method for displaying an electronic document using a double-sided display |
US8904304B2 (en) | 2012-06-25 | 2014-12-02 | Barnesandnoble.Com Llc | Creation and exposure of embedded secondary content data relevant to a primary content page of an electronic book |
US8965809B1 (en) | 2009-05-21 | 2015-02-24 | Stamps.Com Inc. | Restricted printing of postage with layout constraints in a browser |
US20150070264A1 (en) * | 2013-09-11 | 2015-03-12 | Disney Enterprises, Inc. | Animated document using an integrated projector |
US20160091953A1 (en) * | 2011-05-03 | 2016-03-31 | Facebook, Inc. | Adjusting Mobile Device State Based On User Intentions And/Or Identity |
US20170083232A1 (en) * | 2015-09-23 | 2017-03-23 | Microsoft Technology Licensing, Llc | Dual display device |
US9728107B1 (en) * | 2008-04-15 | 2017-08-08 | Stamps.Com Inc. | Systems and methods for protecting content when using a general purpose user interface application |
CN107209611A (en) * | 2014-09-05 | 2017-09-26 | 三星电子株式会社 | Touch panel, electronic memo and mobile terminal |
US10635195B2 (en) * | 2017-02-28 | 2020-04-28 | International Business Machines Corporation | Controlling displayed content using stylus rotation |
US10891028B2 (en) * | 2013-09-18 | 2021-01-12 | Sony Interactive Entertainment Inc. | Information processing device and information processing method |
US11893089B1 (en) | 2004-07-27 | 2024-02-06 | Auctane, Inc. | Systems and methods for protecting content when using a general purpose user interface application |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9311288B2 (en) * | 2011-07-12 | 2016-04-12 | Sony Corporation | Electronic book reader |
US9177530B2 (en) | 2013-03-15 | 2015-11-03 | Brigham Young University | Handheld document reading device with auxiliary display |
CN104483825B (en) * | 2014-12-11 | 2017-01-25 | 深圳市华星光电技术有限公司 | Dial plate of intelligent watch and intelligent watch |
US10996825B2 (en) * | 2016-06-20 | 2021-05-04 | Intel Corporation | Smartbook system having a synergistic page, spine, edge extension and power design |
US11017683B2 (en) * | 2018-11-01 | 2021-05-25 | James Curran, IV | Electronic video ev-Book using flexible video screens |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070120762A1 (en) * | 2005-11-30 | 2007-05-31 | O'gorman Robert W | Providing information in a multi-screen device |
US20090091512A1 (en) * | 2007-10-09 | 2009-04-09 | Samsung Electronics Co., Ltd. | Dual display device and multi display device using the same |
US7865567B1 (en) * | 1993-12-02 | 2011-01-04 | Discovery Patent Holdings, Llc | Virtual on-demand electronic book |
US8018431B1 (en) * | 2006-03-29 | 2011-09-13 | Amazon Technologies, Inc. | Page turner for handheld electronic book reader device |
US8233863B2 (en) * | 2009-01-20 | 2012-07-31 | Lg Electronics Inc. | Mobile terminal having electronic paper and method for controlling the same |
Family Cites Families (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5128662A (en) | 1989-10-20 | 1992-07-07 | Failla Stephen J | Collapsibly segmented display screens for computers or the like |
US7835989B1 (en) | 1992-12-09 | 2010-11-16 | Discovery Communications, Inc. | Electronic book alternative delivery systems |
US20020140628A1 (en) | 1995-08-14 | 2002-10-03 | Morrone James Vincent | Computer addition |
US5847698A (en) | 1996-09-17 | 1998-12-08 | Dataventures, Inc. | Electronic book device |
EP1058181A4 (en) | 1998-02-25 | 2002-09-11 | Sharp Kk | Display device |
JP3567084B2 (en) | 1998-06-30 | 2004-09-15 | シャープ株式会社 | Electronic book device |
US20010040560A1 (en) | 1998-08-20 | 2001-11-15 | Alan Amron | Video display document |
US6386974B1 (en) | 1998-10-09 | 2002-05-14 | Anchor Gaming | Method of playing game and gaming device with interactive driving game display |
US6229502B1 (en) | 1998-11-03 | 2001-05-08 | Cylark Development Llc | Electronic book |
US6343006B1 (en) | 1998-11-20 | 2002-01-29 | Jerry Moscovitch | Computer display screen system and adjustable screen mount, and swinging screens therefor |
JP3540187B2 (en) | 1999-02-25 | 2004-07-07 | シャープ株式会社 | Display device |
JP2000284883A (en) | 1999-03-30 | 2000-10-13 | Minolta Co Ltd | Electronic book |
US20010054986A1 (en) | 1999-05-18 | 2001-12-27 | Michael V. Leman | Pen-based split computer display |
US7340439B2 (en) | 1999-09-28 | 2008-03-04 | Chameleon Network Inc. | Portable electronic authorization system and method |
US7028264B2 (en) | 1999-10-29 | 2006-04-11 | Surfcast, Inc. | System and method for simultaneous display of multiple information sources |
US6996720B1 (en) | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US7138962B2 (en) | 2000-03-29 | 2006-11-21 | Eric Koenig | Multi-task interactive wireless telecommunications device |
US20020021622A1 (en) | 2000-04-07 | 2002-02-21 | Jean-Michel Baroche | Multifunction wristwatch with electronic device and foldable display screen |
JP2001305973A (en) | 2000-04-18 | 2001-11-02 | Seisan Gijutsu Kenkyusho:Kk | Personal computer |
US20020005826A1 (en) | 2000-05-16 | 2002-01-17 | Pederson John C. | LED sign |
WO2001090928A1 (en) | 2000-05-24 | 2001-11-29 | Goreader, Inc. | Method, apparatus, and system for manipulation of electronic content |
US7171692B1 (en) | 2000-06-27 | 2007-01-30 | Microsoft Corporation | Asynchronous communication within a server arrangement |
US6891953B1 (en) | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US6643124B1 (en) | 2000-08-09 | 2003-11-04 | Peter J. Wilk | Multiple display portable computing devices |
US6704733B2 (en) | 2000-10-25 | 2004-03-09 | Lightning Source, Inc. | Distributing electronic books over a computer network |
US6970210B2 (en) | 2000-11-22 | 2005-11-29 | Si Han Kim | Folder type multi display device |
US6792243B2 (en) | 2000-12-21 | 2004-09-14 | Vtech Electronics Limited | Electronic book with simulated three-dimensional illustrations |
US20020135535A1 (en) | 2001-01-20 | 2002-09-26 | Alexander Muller | Portable electronic data processing device |
CA2443831C (en) | 2001-04-12 | 2010-06-08 | Research In Motion Limited | An advanced system and method for dynamically discovering, provisioning and accessing host services on wireless data communication devices |
US20030043087A1 (en) | 2001-08-29 | 2003-03-06 | Kim Hyun Dae | Display screen |
US6819304B2 (en) | 2001-10-11 | 2004-11-16 | International Business Machines Corporation | Adjustable display device with display adjustment function and method therefor |
US6940497B2 (en) | 2001-10-16 | 2005-09-06 | Hewlett-Packard Development Company, L.P. | Portable electronic reading apparatus |
US6532146B1 (en) | 2002-01-23 | 2003-03-11 | Slide View Corp. | Computer display device with dual lateral slide-out screens |
US20030098857A1 (en) | 2001-11-28 | 2003-05-29 | Palm, Inc. | Detachable flexible and expandable display with touch sensor apparatus and method |
US7050835B2 (en) | 2001-12-12 | 2006-05-23 | Universal Display Corporation | Intelligent multi-media display communication system |
CN1356636A (en) | 2001-12-29 | 2002-07-03 | 徐翔 | Method for creating electronic book with intellectual property right protection and its reader |
US7091926B2 (en) | 2002-02-08 | 2006-08-15 | Kulas Charles J | Computer display system using multiple screens |
JP3682467B2 (en) | 2002-02-26 | 2005-08-10 | 典一 佐藤 | Multi display device |
US20030161094A1 (en) | 2002-02-28 | 2003-08-28 | Donald Chambers | Folding/detachable computer screens |
US7079119B2 (en) | 2002-02-28 | 2006-07-18 | Palm, Inc. | Cover for electronic device |
US7095387B2 (en) | 2002-02-28 | 2006-08-22 | Palm, Inc. | Display expansion method and apparatus |
US20050099361A1 (en) | 2002-03-27 | 2005-05-12 | Vladimir Majer | Foldable display/screen for portable electronic devices |
US7355668B2 (en) | 2002-05-22 | 2008-04-08 | Kent State University | Polymer enhanced liquid crystal devices built with rigid or flexible substrates |
US20030218577A1 (en) | 2002-05-22 | 2003-11-27 | Wang Bruce Yunlong | Laptop computer with a large display area |
KR100481507B1 (en) | 2002-08-21 | 2005-04-07 | 삼성전자주식회사 | Image Displayer easy to setting for channels and AV input |
WO2004028010A1 (en) | 2002-09-17 | 2004-04-01 | Si Han Kim | Multi display device |
AU2003289348A1 (en) | 2002-12-27 | 2004-07-29 | Semiconductor Energy Laboratory Co., Ltd. | Display and electronic device |
US7561116B2 (en) | 2003-01-31 | 2009-07-14 | Microsoft Corporation | Multiple display monitor |
US7196689B2 (en) | 2003-03-31 | 2007-03-27 | Canon Kabushiki Kaisha | Information device |
US7592239B2 (en) | 2003-04-30 | 2009-09-22 | Industry University Cooperation Foundation-Hanyang University | Flexible single-crystal film and method of manufacturing the same |
US20050088463A1 (en) | 2003-10-23 | 2005-04-28 | Schilling Donald L. | Expanded display for cell phone, palm pilot or computer |
US20050091359A1 (en) | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Systems and methods for projecting content from computing devices |
US8854278B2 (en) | 2003-12-19 | 2014-10-07 | Hewlett-Packard Development Company, L.P. | Display apparatus |
US7705877B2 (en) | 2004-01-28 | 2010-04-27 | Hewlett-Packard Development Company, L.P. | Method and system for display of facial features on nonplanar surfaces |
JP2006010811A (en) | 2004-06-23 | 2006-01-12 | Sony Corp | Display apparatus |
US7092247B2 (en) | 2004-07-16 | 2006-08-15 | Semmie Kim | Method of designing a size-adjustable multi-mode display unit for portable electronic devices |
US20060044215A1 (en) | 2004-08-24 | 2006-03-02 | Brody Thomas P | Scalable tiled display assembly for forming a large-area flat-panel display by using modular display tiles |
US7469495B2 (en) | 2004-10-08 | 2008-12-30 | Clear Blue, Inc. | Folding display apparatus |
US7714801B2 (en) | 2005-01-05 | 2010-05-11 | Nokia Corporation | Foldable electronic device and a flexible display device |
US20070204078A1 (en) | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US7429108B2 (en) | 2005-11-05 | 2008-09-30 | Outland Research, Llc | Gaze-responsive interface to enhance on-screen user reading tasks |
JP2007206845A (en) | 2006-01-31 | 2007-08-16 | Wacom Co Ltd | Information processor |
US20070279315A1 (en) | 2006-06-01 | 2007-12-06 | Newsflex, Ltd. | Apparatus and method for displaying content on a portable electronic device |
US7782274B2 (en) | 2006-06-09 | 2010-08-24 | Cfph, Llc | Folding multimedia display device |
GB0611452D0 (en) | 2006-06-12 | 2006-07-19 | Plastic Logic Ltd | Page refreshing e-reader |
US20090138402A1 (en) | 2007-11-27 | 2009-05-28 | International Business Machines Corporation | Presenting protected content in a virtual world |
US8860632B2 (en) | 2008-09-08 | 2014-10-14 | Qualcomm Incorporated | Multi-panel device with configurable interface |
US8300022B2 (en) | 2009-01-09 | 2012-10-30 | International Business Machines Corporation | Dynamically reconfigurable touch screen displays |
US20120200487A1 (en) | 2011-02-07 | 2012-08-09 | Research In Motion Limited | Method and apparatus for a multi-page electronic content viewer |
-
2010
- 2010-09-01 US US12/873,994 patent/US8613061B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7865567B1 (en) * | 1993-12-02 | 2011-01-04 | Discovery Patent Holdings, Llc | Virtual on-demand electronic book |
US20070120762A1 (en) * | 2005-11-30 | 2007-05-31 | O'gorman Robert W | Providing information in a multi-screen device |
US8018431B1 (en) * | 2006-03-29 | 2011-09-13 | Amazon Technologies, Inc. | Page turner for handheld electronic book reader device |
US20090091512A1 (en) * | 2007-10-09 | 2009-04-09 | Samsung Electronics Co., Ltd. | Dual display device and multi display device using the same |
US8233863B2 (en) * | 2009-01-20 | 2012-07-31 | Lg Electronics Inc. | Mobile terminal having electronic paper and method for controlling the same |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11893089B1 (en) | 2004-07-27 | 2024-02-06 | Auctane, Inc. | Systems and methods for protecting content when using a general purpose user interface application |
US10339280B1 (en) | 2008-04-15 | 2019-07-02 | Stamps.Com Inc. | Systems and methods for protecting content when using a general purpose user interface application |
US10885153B1 (en) | 2008-04-15 | 2021-01-05 | Stamps.Com Inc. | Systems and methods for protecting content when using a general purpose user interface application |
US9728107B1 (en) * | 2008-04-15 | 2017-08-08 | Stamps.Com Inc. | Systems and methods for protecting content when using a general purpose user interface application |
US8965809B1 (en) | 2009-05-21 | 2015-02-24 | Stamps.Com Inc. | Restricted printing of postage with layout constraints in a browser |
US20160091953A1 (en) * | 2011-05-03 | 2016-03-31 | Facebook, Inc. | Adjusting Mobile Device State Based On User Intentions And/Or Identity |
US9864425B2 (en) * | 2011-05-03 | 2018-01-09 | Facebook, Inc. | Adjusting mobile device state based on user intentions and/or identity |
US20130021261A1 (en) * | 2011-07-18 | 2013-01-24 | Research In Motion Limited | Electronic device and method of controlling same |
US20130050164A1 (en) * | 2011-08-23 | 2013-02-28 | Nicholaus R. Rericha | Electronic device cases and covers having a reflective display, and methods thereof |
WO2013050928A3 (en) * | 2011-10-03 | 2013-05-30 | Nokia Corporation | An apparatus configured to have multiple user interfaces and method |
US9519312B2 (en) | 2011-10-03 | 2016-12-13 | Nokia Technologies Oy | Apparatus comprising a variable number of parts which may be paired in multiple configurations to form a user interface |
US20130227471A1 (en) * | 2012-02-24 | 2013-08-29 | Samsung Electronics Co., Ltd. | Method of providing information and mobile terminal thereof |
US9529520B2 (en) * | 2012-02-24 | 2016-12-27 | Samsung Electronics Co., Ltd. | Method of providing information and mobile terminal thereof |
US8904304B2 (en) | 2012-06-25 | 2014-12-02 | Barnesandnoble.Com Llc | Creation and exposure of embedded secondary content data relevant to a primary content page of an electronic book |
US10042519B2 (en) | 2012-06-25 | 2018-08-07 | Nook Digital, Llc | Creation and exposure of embedded secondary content data relevant to a primary content page of an electronic book |
US20140244801A1 (en) * | 2013-02-28 | 2014-08-28 | Apple Inc. | Network-based distribution system supporting transfer of application products |
US20140347264A1 (en) * | 2013-05-22 | 2014-11-27 | Samsung Electronics Co., Ltd. | Device and method for displaying an electronic document using a double-sided display |
US9285660B2 (en) * | 2013-09-11 | 2016-03-15 | Disney Enterprises, Inc. | Animated document using an integrated projector |
US20150070264A1 (en) * | 2013-09-11 | 2015-03-12 | Disney Enterprises, Inc. | Animated document using an integrated projector |
US10891028B2 (en) * | 2013-09-18 | 2021-01-12 | Sony Interactive Entertainment Inc. | Information processing device and information processing method |
CN107209611A (en) * | 2014-09-05 | 2017-09-26 | 三星电子株式会社 | Touch panel, electronic memo and mobile terminal |
US20170285849A1 (en) * | 2014-09-05 | 2017-10-05 | Samsung Electronics Co., Ltd. | Touch screen panel, electronic notebook, and mobile terminal |
US10379662B2 (en) * | 2014-09-05 | 2019-08-13 | Samsung Electronics Co., Ltd. | Touch screen panel, electronic notebook, and mobile terminal |
US20170083232A1 (en) * | 2015-09-23 | 2017-03-23 | Microsoft Technology Licensing, Llc | Dual display device |
US10635195B2 (en) * | 2017-02-28 | 2020-04-28 | International Business Machines Corporation | Controlling displayed content using stylus rotation |
Also Published As
Publication number | Publication date |
---|---|
US8613061B2 (en) | 2013-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8613061B2 (en) | Methods and apparatus to implement electronic book viewers | |
EP2742455B1 (en) | Indirect authentication | |
US10162981B1 (en) | Content protection on an electronic device | |
US20190311150A1 (en) | Secure data synchronization | |
US8407773B1 (en) | Data and application access combined with communication services | |
KR101590076B1 (en) | Method for managing personal information | |
US8407768B1 (en) | Data and application access combined with communication services | |
US8904550B2 (en) | Selection of sandbox for initiating application | |
Al Ayubi et al. | A mobile app development guideline for hospital settings: Maximizing the use of and minimizing the security risks of" bring your own devices" policies | |
RU2392661C2 (en) | Accessing data before entering system | |
EP2533168B1 (en) | Method and devices for managing permission requests to allow access to computing resource | |
CA2758770C (en) | System, devices and method for secure authentication | |
US20130254899A1 (en) | Data protecting system and protecting method | |
US11720700B2 (en) | Systems and methods for securely deploying a collective workspace across multiple local management agents | |
WO2019245882A1 (en) | Account management using account activity usage restrictions | |
TW202225966A (en) | Systems and methods for self-protecting and self-refreshing workspaces | |
CA2751289C (en) | Methods and apparatus to implement electronic book viewers | |
CA2816007C (en) | Selection of sandbox for initiating application | |
Tarasewich et al. | Mobile interaction design: Integrating individual and organizational perspectives | |
US20220179958A1 (en) | Systems and methods for evaluating security risks using a manufacturer-signed software identification manifest | |
Buecker et al. | Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 | |
JP2007188264A (en) | Display control apparatus | |
US11232220B2 (en) | Encryption management for storage devices | |
Boja et al. | Impact of the security requirements on mobile applications usability | |
Fried | Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RESEARCH IN MOTION CORPORATION, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DVORAK, JOSEPH;HIRSCH, ALEXANDER;SIGNING DATES FROM 20100825 TO 20100830;REEL/FRAME:025005/0692 |
|
AS | Assignment |
Owner name: RESEARCH IN MOTION LIMITED, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RESEARCH IN MOTION CORPORATION;REEL/FRAME:026311/0376 Effective date: 20110208 |
|
AS | Assignment |
Owner name: BLACKBERRY LIMITED, ONTARIO Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:031393/0515 Effective date: 20130709 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103 Effective date: 20230511 |
|
AS | Assignment |
Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064270/0001 Effective date: 20230511 |